دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش:
نویسندگان: Radek Silhavy (editor)
سری: Lecture notes in networks and systems,
ISBN (شابک) : 9783030774455, 3030774457
ناشر: Springer
سال نشر: 2021
تعداد صفحات: 778
زبان: English
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود)
حجم فایل: 73 مگابایت
در صورت تبدیل فایل کتاب Artificial intelligence in intelligent systems : proceedings of 10th Computer Science On-line Conference 2021. Vol. 2 به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب هوش مصنوعی در سیستمهای هوشمند: مجموعه مقالات دهمین کنفرانس آنلاین علوم کامپیوتر 2021. جلد. 2 نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
Preface Organization Program Committee Program Committee Chairs Program Committee Members Technical Program Committee Members Organizing Committee Chair Conference Organizer (Production) Conference Website, Call for Papers Contents Online Teaching as an Important Means of Technogenic Society Development During the Pandemic 1 Introduction 2 Methods 3 Results 4 Discussions 5 Conclusion References Application of Principal Component Analysis Based Support Vector Machine for Long-Run Economic Growth Forecasting 1 Introduction 2 Study Methodology 2.1 Principal Component Analysis 2.2 Support Vector Machine 3 Data Description 4 Models Performance Indicators 5 Experiment and Results Discussion 6 Conclusion References Experimental Study of Speed Parameters and Resource Intensity of Programming Languages for Embedded Systems 1 Introduction 2 Literature Review 3 Methods 3.1 Code Writing and the Difference Between C and C++ Implementations 4 Result 4.1 General Testing Methodology 4.2 Speed Parameter Testing 4.3 Testing for Resource Intensity and Memory Operating Speed 5 Discussion 5.1 Speed Parameter Analysis 5.2 Memory Operating Analysis 5.3 Further Prospects 6 Conclusion References Classification of Cardiotocography Data for Fetal Health Using Feature Selection Techniques 1 Introduction 2 Related Work 2.1 Mislabelled Data 2.2 Missing Values 2.3 Noisy Data 2.4 High Dimensionality 2.5 Imbalance Data 3 Methodology 4 Experiments and Results 5 Conclusion References Intersection as an Event- and Agent-Based System 1 Introduction 1.1 Systems in Matlab/Simulink 1.2 Related Work in Transportation 1.3 Our Goal 2 Methods 2.1 HW and SW Configuration 2.2 Intersection 2.3 Entities 2.4 Road Traffic Regulations 2.5 Traffic Lights Control Algorithm 3 Results 4 Conclusion 4.1 Basic Terms 4.2 Modelling and Simulation 4.3 Further Development References Comparison of UAV Landing Site Classifications with Deep Neural Networks 1 Introduction 2 Methods 2.1 HW and SW Configuration 2.2 Deep Neural Networks 2.3 Classes of Landing Site 2.4 Training Sets 2.5 Classification of the Test Set 3 Results 4 Conclusion 4.1 On Results 4.2 Indoor-Outdoor, Invariance 4.3 Bio-inspired Approach References An Approach to Optimize Multi-objective Problems Using Hybrid Genetic Algorithms Supported by Initial Centroid Selection Optimization Enhanced K-Means Based Selection Operator 1 Introduction 1.1 Evolutionary Computation 1.2 Multi-objective Optimization Problems 2 Background 2.1 Genetic Algorithms 2.2 Particle Swarm Optimization 2.3 Hybrid Genetic Algorithms 2.4 The K-Means Clustering Algorithm 2.5 Multi-objective Optimization Benchmark Functions 3 Challenges 3.1 Challenges Facing Genetic Algorithms 3.2 Multi-objective Optimization Challenges 4 Proposed Model Architecture 4.1 Proposed Algorithm 5 Results 6 Discussion of Results 6.1 Results Analysis 6.2 Complexity 6.3 Contributions 7 Conclusion References Numerical Modelling of the Impact of Dredging on Stability of Oum Rabiâ Estuary (Morocco) Using SWAN Model 1 Introduction 2 Problem Statement 3 Description of the Numerical Model 4 Results and Discussion 5 Conclusion References New Method of Verifying Cryptographic Protocols, Based on the Process Model 1 Introduction 2 Sequential and Distributed Processes 2.1 Auxiliary Concepts 2.2 Sequential Processes 2.3 Prefix Actions and Renamings 2.4 Distributed Processes 2.5 Schemes of Distributed Processes 2.6 Transition Graphs of Distributed Processes 2.7 Values of Expressions and Formulas in States of Distributed Processes 2.8 Marking of a Transition Graph 3 Application of Markings of Transition Graphs to the Problems of Verification of Distributed Processes 4 Conclusion References A Method of Search Space Adaptation in the False Pseudonyms Detection Procedure 1 Introduction 2 The Approaches to the False Pseudonyms Detection Problem 3 An Authorship Analysis Used by the Cognitive Assistant for the Victim Behavior Prevention 4 Search Space Adaptation Based on the Distributed Ledger Elements and Fuzzy Cognitive Map Usage 5 FCM Construction 6 Simulation Results: The Usage of the FCM 7 Conclusions References Analytical Studies of Behavior of Users of the Moscow Electronic School Service 1 Introduction 2 Literature Review 3 Methods 4 The Problem Statement 5 The Study Results’ 6 Discussion 7 Conclusion References Information and Control Systems with Distributed Ledger Usage: A Reliability Issue 1 Introduction 2 Information and Control Systems in the Fog: The Reliability Issue 3 Distributed Ledger Technologies and Information Exchange Model of the Blockchain-Based Ledger 4 Workload Modeling for the System with Distributed Ledger Usage 5 Simulation Results 6 Conclusions References A Modified Ontology-Based Method of Workload Relocation Problem Solving for Monitoring and Forecasting Systems 1 Introduction 2 A Modified Method of Workload Relocation Problem Solving 3 Ontology - Based Analysis Simulation Results 4 Discussion and Conclusions References Intelligent Data Analysis Using a Classification Method for Data Mining Knowledge Discovery Process 1 Data Mining 2 Education Data Mining 3 Classification Model 3.1 Model Designing (Training Phase) 3.2 Model Application – for Classifying New Objects References Multimodal Transportation Overview and Optimization Ontology for a Greener Future 1 Introduction 2 Related Work 3 Requirements for the Ontology 3.1 Relevant Optimisation Requirements 4 Methodology for Ontology Development 4.1 Conceptual Modelling 4.2 Methodology Application 5 Structure of the Ontology 5.1 Main Abstracted Classes 5.2 Order 5.3 Hub 5.4 Leg 5.5 Operations 6 Results 7 Conclusions and Further Work References A Complex Cognitive-Based Technique for Social Tension Detection in the Internet 1 Introduction 2 Language Data Markers 3 A Set of Emotional States Markers Relating to Social Tention 4 A Complex Cognitive-Based Technique for Social Tension Detection in the Global Network 5 Simulation Results 6 Conclusions References Method of Crystallization of Alternatives for Solving the Problem of Placing VLSI Elements 1 Introduction 2 Formulation of the Placement Problem 3 The Placement Mechanisms on the Base Alternative Crystallization Field Method 4 The Placement Algorithm on the Base Alternative Crystallization Field Method 5 Experimental Research 6 Conclusion References Resilient Rerouting in IoT Systems with Evolutionary Computing 1 Introduction 1.1 Research Questions and Contributions 2 Related Work 3 Resilient Model to Node-Link Failures in IoT 3.1 Main Objective 3.2 Mathematical Definition 3.3 Establishing a Framework of Resilience to Node-Link Failures 3.4 Mathematical Analysis of EGA-Based Model 3.5 Towards Optimal Generation of the Transmission Route 4 Experimental Evaluations 4.1 Experimental Setup: Rerouting in Thirty (30) Nodes Network 4.2 Performance Analysis of Thirty (30) Nodes Network with Different Number of Node-link Failures 4.3 Experiment 1: Consider an IoT Network Without Node-Link Failures 4.4 Experiment 5: Consider an IoT Network with Two Nodes and Four Links Failure (Failed Nodes: H and G, Failed Links: H – J, G – I, D – H and D – G) 4.5 Experiment 7: Consider an IoT Network with Three Nodes and Six Links Failure (Failed Nodes: H, G and I, Failed Links: H – J, G – I, D – H, D – G, I – E and H – R) 5 Benchmarking the Proposed Model with Popular Routing Algorithms 6 Conclusion References Urban Monthly Water Consumption Forecasting Based on Signal Decomposition and Optimized Extreme Learning Machine 1 Introduction 2 Related Work 3 Methodology 3.1 Secondary Decomposition of EMD by VMD (SDEMD) 3.2 Extreme Learning Machine Optimized by Particle Swarm Optimization (PSO-ELM) 4 Experimental Results and Analysis 4.1 Dataset and Data Processing 4.2 Model Performance Evaluation Indicators 4.3 Feature Selection 4.4 Experimental Results and Discussion 5 Conclusions References Comparison of Control Systems Based on PID Controllers and Based on Fuzzy Logic Using MatLab and Simulink 1 Introduction 2 Model of an Automatic Control System Using a PID Controller 3 Model of an Automatic Control System with a Fuzzy Controller 4 Conclusion References The Impact of Promotion and Price Perception on Buying Decision and Repurchase Intention Through Online Shopping 1 Introduction 2 Literature Review and Research Hypotheses 2.1 Promotion 2.2 Price Perception 2.3 Purchase Decision and Repurchase Intention 3 Research Methodology 3.1 Measures 3.2 Sample and Data Collection 3.3 Analytical Approach 4 Results and Discussion 4.1 Results 4.2 Discussion 5 Conclusions and Limitations References Review Rating Prediction Based on Text Polarity in the Czech and Slovak Languages 1 Introduction 2 Related Work 3 The Data 4 Results and Discussion 5 Conclusion References Parameters of Recognition Algorithms for the Background Subtraction of Color Medical Images 1 Introduction 2 Materials and Methods 3 Results 4 Conclusions References Classification of Plant Diseases Using Convolutional Neural Networks 1 Introduction 2 Transfer Learning 3 Materials and Methods 3.1 Dataset 3.2 Software and Hardware Specifications 3.3 Deep Learning Architectures 3.4 Training Specifications 4 Results and Discussion 5 Conclusions References Pairwise Separability in the Problem of Identifying Objects in Photographs Using the Example of Cultural and Historical Architectural Buildings 1 Preliminaries 1.1 Introduction 1.2 Mathematical Basics 1.3 Machine Learning Models 1.4 Dataset 2 Results 2.1 Results for Convolution Neural Network 2.2 Results for Support Vector Machine 2.3 Results for Naive Bayes Classifier 2.4 Results for k Nearest Neighbors 2.5 Results for Decision Tree Classifier 3 Using Gradient Boosting 4 Conclusion References Cognitive Logic’s Principles 1 Introduction 2 The Research Methodology 3 Research Results 3.1 The Relationship Between Mathematical Logic and Cognitive Logic is Described 3.2 Cognitive Dichotomous Logic 3.3 Oppositional and Dichotomous Division 3.4 Case and Codified Reasoning 4 Conclusion References A Machine Learning Firefly Algorithm Applied to the Resource Allocation Problems 1 Introduction 2 KnapSack Problem 3 Binary Firefly Algorithm 3.1 Initialization and Element Weighting 3.2 K-Means Transition Ranking Operator 3.3 Repair Operator 4 Results 4.1 Insight of BKFA Algorithm 5 Conclusions References Market Acceptance of the Blockchain Technology on the Example of Bitcoin 1 Introduction 2 Features of Bitcoin as a Technology and Asset 3 Bitcoin Price Factors 4 Methods, Modelling, and Assessment of the Study Results 5 Conclusions References A Machine Learning Firefly Algorithm Applied to the Matrix Covering Problem 1 Introduction 2 Set Covering Problem 3 Binary Firefly Algorithm 3.1 Initialization 3.2 Machine Learning Transition Ranking Operator 3.3 Heuristic Operator 4 Results 4.1 Insight of MLFA Algorithm 5 Conclusions References Introduction into Autonomous Mobile Robot Research and Multi Cooperation 1 Introduction 2 AMR (Autonomous Mobile Robot) 2.1 Navigation 2.2 SLAM 3 Fleet 3.1 Centralized 3.2 Decentralized 3.3 Combined 4 Communication 5 Path Planning Algorithms 6 Path Planning in Fleet 7 Conclusion References Equilibrium Commodity Flow Assignment in Simple Networks 1 Introduction 2 Equilibrium Commodity Flow Assignment 3 Commodity Network of Three Nodes 4 Commodity Network of Four Nodes 5 Discussions 6 Conclusion References Co-evolutionary Approach to Solving the Problem of VLSI Partitioning Using the Ant Colony Method 1 Introduction 2 Formulation of the Partition Problem 3 Development of a Co-evolutionary Partitioning Algorithm Based on Models of Adaptive Behavior of an Ant Colony 4 Co-evolutionary Partitioning Algorithm 5 Experimental Research 6 Conclusion References Evaluation of the Dependence of the Air Temperature Influence on the Reproductive Function of Cows Based on ASC-Analysis 1 Introduction 2 Materials and Methods 3 Results and Discussion 4 Conclusion References Adaptive Control of the Movement of a Team of Mobile Robots in a Column 1 Introduction 2 Control of the Movement of a Group of Robots in a “Escort” Formation 3 Algorithm of Movement of a Group of Robots in a “Escort” Type Formation Based on Collective Adaptation 4 Conclusion References A Binary Firefly Algorithm Applied to Knapsack Problem 1 Introduction 2 KnapSack Problem 3 Binary Percentile Firefly Algorithm 3.1 Initialization and Element Weighting 3.2 Percentile Operator 3.3 Repair Operator 4 Results 4.1 Understanding BPFA Contribution 5 Conclusions References Adapted Model Neural-Like Hopfield Network and the Algorithm of Its Training for Finding the Roots Systems of Linear Algebraic Equations 1 Introduction 2 Approaches to Solving System of Linear Algebraic Equations 3 Task Formulation 4 Modified Hopfield Network and Parameter Definition 5 Configuration of Network Model and Capacity Research 6 Conclusion References Data Classification in Medicine and Healthcare Service 1 Introduction 2 Materials and Methods 3 Results References Development of a Method for Automatic Generation and Optimization of Fuzzy Controller Parameters Based on an Adaptive Genetic Algorithm 1 Introduction 2 Method for Automatic Generation and Optimization of Fuzzy Controller Parameters 3 Adaptive Genetic Algorithm 4 Result Analysis 5 Discussion 6 Conclusion References Application of Machine Learning for Post Process Mining Analysis and Problem Detection in Bank 1 Introduction 2 Application of Machine Learning 3 Conclusion References Comprehensive Analysis of Cryptographic Protocol Implementations Using Formal Verification and Dynamic Analysis Using the PDA Language 1 Introduction 2 Proposed Verification Scheme 3 Formal Verification 4 Formal Verification of Source Codes 5 Dynamic Analysis 6 PDA Language 6.1 Section «Projects» 6.2 Section «Parameters» 6.3 Section «MainProtocol1» 6.4 Section «Model1» 6.5 Section «Run» 7 Results 8 Discussion 9 Conclusion References Stationary Distribution in the One Server Queuing System M|M|1| with the Stopping Intensity of the Input Flow 1 Introduction 2 Methods 3 Results 4 Discussions 5 Conclusion 6 Checklist of Items to be Sent to Volume Editors References Advantages of Data Mining for Digital Transformation of the Educational System 1 Digital Transformation in the Educational System 2 Basic Application Aspects of the Huge Data Sets in the Educational System References Matrix Product State Representations for Machine Learning 1 Introduction 2 RBM Learning of MPS Networks 3 Conclusions References Improved Kangaroo Mob Optimization and Logistic Regression for Smart Grid Stability Classification 1 Introduction 2 Related Work 2.1 Bio-Inspired Algorithms for Machine Learning Models Tuning 2.2 Smart Grid Stability Classification 3 IKMO 4 IKMO Evaluation 5 IKMO LR Method for Smart Grid Stability Classification 5.1 High-Level View of the IKMO LR Method for Smart Grid Stability Classification 5.2 Experiments Configuration 5.3 Experimental Results 5.4 Comparison with Literature Results 6 Conclusions References Design and Development of the Optimal Technique for the Enhancement of Contrast and Brightness Quality of Hand Capture Images Using Wavelet Transformation 1 Introduction 2 Related Work 3 Problem Description 4 Proposed Methodology 5 Algorithm Implementation 5.1 Algorithm for Non-linear Processing of Luminance 5.2 Algorithm for Mitigating Multiplicative Artifacts 5.3 Algorithm for Optimally Enhanced Image 6 Results Discussion 7 Conclusion References Distance Learning Advantages and Disadvantages: Teaching Experience Analysis at the University with the Basis on Different Informational-Communicative Technologies 1 Introduction 2 Methods 2.1 Object of Study 2.2 Subject of Study 3 Results 4 Discussion 5 Conclusion References Heat Load Forecasting: Comparison Between Neuro-Fuzzy and Neural Network Approaches, a Real World Case Study 1 Introduction 2 Related Works 2.1 Methodology 3 Data Set 3.1 Data Sets Normalization and Preprocessing 3.2 Feature Selection 3.3 ANN and ANFIS Modelling 4 Results 4.1 Numerical Results 5 Conclusion References Emergency Locksmith: A Restricted Dynamic Device Authentication Design Pattern for the Healthcare IoT 1 Introduction 2 Background Research 2.1 Current Emergency Oriented Healthcare IoT Works 2.2 Design Patterns in IoT 3 Emergency Locksmith: An Authentication Design Pattern 4 Results 5 Discussion and Future Directions References Fuzzy Model with Meteorological Variables for the Determination of the THSW Index and the Electric Field in the Area of East Lima, Peru 1 Introduction 2 Literature Review 2.1 Fuzzy Logic 3 Methodology Selection: THSW Index and Electric Field 3.1 Meteorological Variables 4 Results 4.1 Fuzzy Model Design for Meteorological Variables 4.2 Results of the Fuzzy Logic Model 4.3 Evaluation of the Proposed Solution 4.4 Experimental Evaluation of the Fuzzy Model 4.5 Results of the Meteorological Research Variables 5 Conclusions References Hyper-heuristics: Method of Differential Evolution and Bat Method for Selecting Classification Features 1 Introduction 1.1 Background 2 Methods 2.1 Proposed Methodology 2.2 Theoretical Basis 2.3 Proposed Hyper-heuristic Algorithm 3 Experimental Results and Discussion 4 Conclusion References Method for the Synthesis of Fuzzy Controllers from Experimental Data Based on Clustering 1 Introduction 2 Proposed Method 3 Results 4 Discussion 5 Conclusion References Heuristic Backward Chaining Based on Predicate Tensorization 1 Introduction 2 Backward Chaining and Heuristic Search 3 Heuristic Backward Chaining 3.1 Tabling 3.2 Core Function 3.3 Examples 4 Backward Chaining Extensions 5 Related Work 6 Conclusion References Deep Learning for the Classification of Charge Density Plots of Lithium-Ion Cathode Materials 1 Introduction 2 Materials and Methods 3 Results and Discussion 4 Conclusion References Circular Encryption Algorithms to Provide a Secure Channel for Storing and Transmitting Information in Mobile Robot Groups 1 Introduction 2 Principle of Function Hash Operation 3 Anonymous Hashing Algorithms 4 Cryptonote for Information Interaction of the Robot 5 Conclusions References Utilisation of EU Employment Data in Lecturing Data Mining Course 1 Introduction 2 Data and Methods 2.1 Eurostat Database 2.2 Statistical Classification of Economic Activities - NACE 3 Practical Example 3.1 Example EU Employment in Software ORANGE 4 Conclusion References A Decentralized Ontology Versioning Model Designed for Inter-operability and Multi-organizational Data Exchange 1 Introduction 2 Related Work 3 Proposed Model 3.1 Overall Architecture 3.2 Ontology Versioning and Evolution 3.3 Formal Definition 3.4 Data Model 3.5 Voting System 3.6 Consensus Mechanism 4 Conclusion References Digital Transformation in HR Management 1 Introduction 2 Methods 2.1 Comparison of Telework in Russia and Abroad 2.2 Methods for Calculating Compensation for Equipment Used by a Remote Worker 2.3 Labor Safety of Remote Workers 2.4 Labor Rationing 3 Results 4 Discussions 5 Conclusion References A Time Series Forecasting of Electricity Demand by ARIMA and ReLU Based ANN 1 Introduction 2 Literature Review 3 Methods 4 Results 4.1 ARIMA Model 4.2 ANN 5 Conclusions References Measurement of Transmission Speed in a Wireless Network with Encrypted Communication Using Various Security Protocols 1 Introduction 2 Measuring the Transmission Speed in a Wireless Network 3 Transmission Rate Measurements Using the IEEE 802.11n Standard 4 Transmission Rate Measurement with the IEEE 802.11ac Standard 5 Conclusion References Severity Estimation of Potholes in Imagery Using Convolutional Neural Networks 1 Introduction 2 Related Works 3 Proposed Method 4 Results 5 Conclusion References Portfolio Optimization Model for Asset Allocation Problem Based on Alternative Risk Measures 1 Introduction 2 Methods 2.1 The Markowitz Model for Portfolio Optimization 2.2 The Market Model (the Sharpe Index Model) for Investment Portfolio Optimization 2.3 Modification of the Markowitz Model Based on the ( 2R2p - 2R2plow )- and ( 2R2p - 2R2pVaR )-Risk Measures for Portfolio 3 Results 3.1 The Markowitz Model and the Market Model for Portfolio Optimization 3.2 Case Study for ( 2R2p - 2R2plow )- and ( 2R2p - 2R2pVaR )-Minimizing Problem 3.3 Portfolio Efficiency Assessment in Real Time 4 Discussions 5 Conclusion References The Assembly Processes Automation Methodology According to the IEC 61499 Standard on the LEGO Example 1 Introduction 2 Methodology for Assembling 3D Structures 2.1 Connection Scheme 2.2 Prolog 2.3 FB 3 Implementation Example 4 Conclusion References Conceptual Approach to Implementation of Adaptive Protection of Operational Cybersecurity Centers 1 Introduction 2 Mathematical Model of a Complex Security System 3 Conclusion References The Method of Context-Dependent Annotation Based on the Spectral Language Model in Information Systems for Monitoring Emergencies 1 Introduction 2 Method 3 Results 4 Discussion 5 Conclusion References Cased Based Reasoning in Business Process Management Design 1 Introduction 2 Literature Review 3 Storing BPMN Diagrams 4 Retrieving BPMN Diagrams 5 Adapting and Retaining BPMN Diagrams 6 Discussion 7 Conclusion References Cognitive Expert Assessment 1 Introduction 2 Research Methodology 3 Research Results 3.1 Cognitive Model of Expert Assessment 3.2 Scenario Expert Assessments 3.3 Influence of Informational and Cognitive Interaction on the Result of Expert Assessment 3.4 Representative Measurement Theory in Expert Assessment 4 Conclusion References A Percentile Firefly Algorithm an Application to the Set Covering Problem 1 Introduction 2 Set Covering Problem 3 Binary Percentile Firefly Algorithm 3.1 Initialization 3.2 Percentile Binary Operator 4 Results 4.1 Insight of BPFA Algorithm 4.2 BPFA Compared with JPSO and MDBBH 5 Conclusions References Author Index