Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
An Introduction to the Machine Learning Empowered Intelligent Data Center NetworkingFundamentals of Machine Learning in Data Center Networks. This book reviews the common learning paradigms that are widely used in data centernetworks, and offers an introduction to data collection and data processing in data centers. Additionally, it proposes a multi-dimensional and multi-perspective solution quality assessment system called REBEL-3S. The book offers readers a solid foundation for conducting research in the field of AI-assisted data center networks.Comprehensive Survey of AI-assisted Intelligent Data Center Networks. This book comprehensively investigates the peer-reviewed literature published in recent years. The wide range of machine learning techniques is fully reflected to allow fair comparisons. In addition, the book provides in-depth analysis and enlightening discussions on the effectiveness of AI in DCNs from various perspectives, covering flow prediction, flow classification, load balancing, resource management, energy management, routing optimization, congestion control, fault management, and network security.Provides a Broad Overview with Key Insights. This book introduces several novel intelligent networking concepts pioneered by real-world industries, such as Knowledge Defined Networks, Self-Driving Networks, Intent-driven Networks and Intent-based Networks. Moreover, it shares unique insights into the technological evolution of the fusion of artificial intelligence and data center networks, together with selected challenges and future research opportunities.
This book provides a concise but comprehensive guide to representation, which forms the core of Machine Learning (ML). State-of-the-art practical applications involve a number of challenges for the analysis of high-dimensional data. Unfortunately, many popular ML algorithms fail to perform, in both theory and practice, when they are confronted with the huge size of the underlying data. Solutions to this problem are aptly covered in the book.In addition, the book covers a wide range of representation techniques that are important for academics and ML practitioners alike, such as Locality Sensitive Hashing (LSH), Distance Metrics and Fractional Norms, Principal Components (PCs), Random Projections and Autoencoders. Several experimental results are provided in the book to demonstrate the discussed techniques¿ effectiveness.
Convolutional Neural Networks for Medical Applications consists of research investigated by the author, containing state-of-the-art knowledge, authored by Dr Teoh Teik Toe, in applying Convolutional Neural Networks (CNNs) to the medical imagery domain. This book will expose researchers to various applications and techniques applied with deep learning on medical images, as well as unique techniques to enhance the performance of these networks.Through the various chapters and topics covered, this book provides knowledge about the fundamentals of deep learning to a common reader while allowing a research scholar to identify some futuristic problem areas. The topics covered include brain tumor classification, pneumonia image classification, white blood cell classification, skin cancer classification and diabetic retinopathy detection. The first chapter will begin by introducing various topics used in training CNNs to help readers with common concepts covered across the book. Each chapter begins by providing information about the disease, its implications to the affected and how the use of CNNs can help to tackle issues faced in healthcare. Readers would be exposed to various performance enhancement techniques, which have been tried and tested successfully, such as specific data augmentations and image processing techniques utilized to improve the accuracy of the models.
A dynamic network is frequently encountered in various real industrial applications, such as the Internet of Things. It is composed of numerous nodes and large-scale dynamic real-time interactions among them, where each node indicates a specified entity, each directed link indicates a real-time interaction, and the strength of an interaction can be quantified as the weight of a link. As the involved nodes increase drastically, it becomes impossible to observe their full interactions at each time slot, making a resultant dynamic network High Dimensional and Incomplete (HDI). An HDI dynamic network with directed and weighted links, despite its HDI nature, contains rich knowledge regarding involved nodes¿ various behavior patterns. Therefore, it is essential to study how to build efficient and effective representation learning models for acquiring useful knowledge.In this book, we first model a dynamic network into an HDI tensor and present the basic latent factorization of tensors (LFT) model. Then, we propose four representative LFT-based network representation methods. The first method integrates the short-time bias, long-time bias and preprocessing bias to precisely represent the volatility of network data. The second method utilizes a proportion-al-integral-derivative controller to construct an adjusted instance error to achieve a higher convergence rate. The third method considers the non-negativity of fluctuating network data by constraining latent features to be non-negative and incorporating the extended linear bias. The fourth method adopts an alternating direction method of multipliers framework to build a learning model for implementing representation to dynamic networks with high preciseness and efficiency.
Objective Information Theory (OIT) is proposed to represent and compute the information in a large-scale complex information system with big data in this monograph. To formally analyze, design, develop, and evaluate the information, OIT interprets the information from essential nature, measures the information from mathematical properties, and models the information from concept, logic, and physic. As the exemplified applications, Air Traffic Control System (ATCS) and Smart Court SoSs (System of Systems) are introduced for practical OITs. This Open Access book can be used as a technical reference book in the field of information science and also a reference textbook for senior students and graduate ones in related majors.
Although deep learning models have achieved great progress in vision, speech, language, planning, control, and many other areas, there still exists a large performance gap between deep learning models and the human cognitive system. Many researchers argue that one of the major reasons accounting for the performance gap is that deep learning models and the human cognitive system process visual information in very different ways.To mimic the performance gap, since 2014, there has been a trend to model various cognitive mechanisms from cognitive neuroscience, e.g., attention, memory, reasoning, and decision, based on deep learning models. This book unifies these new kinds of deep learning models and calls them deep cognitive networks, which model various human cognitive mechanisms based on deep learning models. As a result, various cognitive functions are implemented, e.g., selective extraction, knowledge reuse, and problem solving, for more effective information processing.This book first summarizes existing evidence of human cognitive mechanism modeling from cognitive psychology and proposes a general framework of deep cognitive networks that jointly considers multiple cognitive mechanisms. Then, it analyzes related works and focuses primarily but not exclusively, on the taxonomy of four key cognitive mechanisms (i.e., attention, memory, reasoning, and decision) surrounding deep cognitive networks. Finally, this book studies two representative cases of applying deep cognitive networks to the task of image-text matching and discusses important future directions.
This book introduces readers to the fundamentals of the cross-technology coexistence problem in heterogeneous wireless networks. It also highlights a range of mechanisms designed to combat this problem and improve network performance, including protocol design, theoretical analysis, and experimental evaluation.In turn, the book proposes three mechanisms that can be combined to combat the cross-technology coexistence problem and improve network performance. First, the authors present a fast signal identification method. It provides the basis for the subsequent protocol design and allows heterogeneous devices to adopt proper transmission strategies. Second, the authors present two cross-technology interference management mechanisms in both the time domain and the frequency domain, which can mitigate interference and increase transmission opportunities for heterogeneous devices, thus improving network performance. Third, they present a cross-technology communication mechanism basedon symbol-level energy modulation, which allows heterogeneous devices to transmit information directly without a gateway, improving transmission efficiency and paving the way for new applications in IoT scenarios. Lastly, they outline several potential research directions to further improve the efficiency of cross-technology coexistence. This book is intended for researchers, computer scientists, and engineers who are interested in the research areas of wireless networking, wireless communication, mobile computing, and Internet of Things. Advanced-level students studying these topics will benefit from the book as well.
Natural interaction is one of the hottest research issues in human-computer interaction. At present, there is an urgent need for intelligent devices (service robots, virtual humans, etc.) to be able to understand intentions in an interactive dialogue. Focusing on human-computer understanding based on deep learning methods, the book systematically introduces readers to intention recognition, unknown intention detection, and new intention discovery in human-computer dialogue. This book is the first to present interactive dialogue intention analysis in the context of natural interaction. In addition to helping readers master the key technologies and concepts of human-machine dialogue intention analysis and catch up on the latest advances, it includes valuable references for further research.
Document layout analysis (DLA) is a crucial step towards the development of an effective document image processing system. In the early days of document image processing, DLA was not considered as a complete and complex research problem, rather just a pre-processing step having some minor challenges. The main reason for that is the type of layout being considered for processing was simple. Researchers started paying attention to this complex problem as they come across a large variety of documents. This book presents a clear view of the past, present, and future of DLA, and it also discusses two recent methods developed to address the said problem.
This book mainly shows readers how to calibrate and control robots. In this regard, it proposes three control schemes: an error-summation enhanced Newton algorithm for model predictive control; RNN for solving perturbed time-varying underdetermined linear systems; and a new joint-drift-free scheme aided with projected ZNN, which can effectively improve robot control accuracy. Moreover, the book develops four advanced algorithms for robot calibration ¿ Levenberg-Marquarelt with diversified regularizations; improved covariance matrix adaptive evolution strategy; quadratic interpolated beetle antennae search algorithm; and a novel variable step-size Levenberg-Marquardt algorithm ¿ which can effectively enhance robot positioning accuracy.In addition, it is exceedingly difficult for experts in other fields to conduct robot arm calibration studies without calibration data. Thus, this book provides a publicly available dataset to assist researchers from other fields in conductingcalibration experiments and validating their ideas. The book also discusses six regularization schemes based on its robot error models, i.e., L1, L2, dropout, elastic, log, and swish. Robots¿ positioning accuracy is significantly improved after calibration. Using the control and calibration methods developed here, readers will be ready to conduct their own research and experiments.
As a privacy-preserving and illumination-robust manner, WiFi signal-based user authentication has become a new direction for ubiquitous user authentication to protect user privacy and security. It gradually turns into an important option for addressing the security concern of IoT environment.However, due to the limited sensing capability of WiFi signals and wide application scenarios, WiFi signal-based user authentication suffers from practical issues of diversified behaviors and complex scenarios.Therefore, it is necessary to address the issues and build integrated systems for user authentication using WiFi signals. In this book, the development and progress of WiFi signal-based user authentication systems in extensive scenarios are presented, which provides a new direction and solution for ubiquitous security and privacy protection. This book gives strong motivation of leveraging WiFi signals to sense human activities for user authentication, and presents the keyissues of WiFi-based user authentication in diversified behaviors and complex scenarios. This book provides the approaches for digging WiFi signals to sense human activities and extract features, realizing user authentication under fine-grained finger gestures, undefined body gestures, and multi-user scenarios. State-of-the-art researches and future directions involved with WiFi signal-based user authentication are presented and discussed as well. This book will benefit researchers and practitioners in the related field.
Mobile crowdsensing (MCS) is emerging as a novel sensing paradigm in the Internet of Things (IoTs) due to the proliferation of smart devices (e.g., smartphones, wearable devices) in people¿s daily lives. These ubiquitous devices provide an opportunity to harness the wisdom of crowds by recruiting mobile users to collectively perform sensing tasks, which largely collect data about a wide range of human activities and the surrounding environment. However, users suffer from resource consumption such as battery, processing power, and storage, which discourages users¿ participation. To ensure the participation rate, it is necessary to employ an incentive mechanism to compensate users¿ costs such that users are willing to take part in crowdsensing.This book sheds light on the design of incentive mechanisms for MCS in the context of game theory. Particularly, this book presents several game-theoretic models for MCS in different scenarios. In Chapter 1, the authors present an overview of MCS and state the significance of incentive mechanism for MCS. Then, in Chapter 2, 3, 4, and 5, the authors propose a long-term incentive mechanism, a fair incentive mechanism, a collaborative incentive mechanism, and a coopetition-aware incentive mechanism for MCS, respectively. Finally, Chapter 6 summarizes this book and point out the future directions.This book is of particular interest to the readers and researchers in the field of IoT research, especially in the interdisciplinary field of network economics and IoT.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.