ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Intelligent Information and Database Systems: 13th Asian Conference, ACIIDS 2021, Phuket, Thailand, April 7–10, 2021, Proceedings (Lecture Notes in Computer Science, 12672)

دانلود کتاب اطلاعات هوشمند و سیستم های پایگاه داده: سیزدهمین کنفرانس آسیایی، ACIIDS 2021، پوکت، تایلند، 7 تا 10 آوریل، 2021، مجموعه مقالات (یادداشت های سخنرانی در علوم کامپیوتر، 12672)

Intelligent Information and Database Systems: 13th Asian Conference, ACIIDS 2021, Phuket, Thailand, April 7–10, 2021, Proceedings (Lecture Notes in Computer Science, 12672)

مشخصات کتاب

Intelligent Information and Database Systems: 13th Asian Conference, ACIIDS 2021, Phuket, Thailand, April 7–10, 2021, Proceedings (Lecture Notes in Computer Science, 12672)

ویرایش:  
نویسندگان: , , ,   
سری:  
ISBN (شابک) : 3030732797, 9783030732790 
ناشر: Springer 
سال نشر: 2021 
تعداد صفحات: 881 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 93 مگابایت 

قیمت کتاب (تومان) : 68,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 3


در صورت تبدیل فایل کتاب Intelligent Information and Database Systems: 13th Asian Conference, ACIIDS 2021, Phuket, Thailand, April 7–10, 2021, Proceedings (Lecture Notes in Computer Science, 12672) به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب اطلاعات هوشمند و سیستم های پایگاه داده: سیزدهمین کنفرانس آسیایی، ACIIDS 2021، پوکت، تایلند، 7 تا 10 آوریل، 2021، مجموعه مقالات (یادداشت های سخنرانی در علوم کامپیوتر، 12672) نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی درمورد کتاب به خارجی



فهرست مطالب

Preface
Conference Organization
Contents
Data Mining Methods and Applications
Mining Partially-Ordered Episode Rules in an Event Sequence
	1 Introduction
	2 Problem Definition
	3 The POERM Algorithm
	4 Experimental Evaluation
	5 Conclusion
	References
Investigating Crossover Operators in Genetic Algorithms for High-Utility Itemset Mining
	1 Introduction
	2 Preliminaries
	3 The Headless Chicken Test for HUIM Using GAs
	4 Experiments and Results
		4.1 Runtime
		4.2 Discovered HUIs
		4.3 Convergence
	5 Conclusion
	References
Complexes of Low Dimensional Linear Classifiers with L1 Margins
	1 Introduction
	2 Linear Separability of Feature Vectors
	3 Dual Hyperplanes and Vertices in the Parameter Space
	4 Perceptron Criterion Function
	5 Basis Exchange Algorithms
	6 Reduced Criterion Functions
	7 Complexes of Linear Classifiers
	8 Concluding Remarks
	References
Automatic Identification of Bird Species from Audio
	1 Introduction
	2 State of Art
		2.1 Preprocessing and Feature Extraction
		2.2 Deep Learning for Sound Classification
		2.3 Other Approaches
	3 Our Approach
		3.1 Pre-processing
		3.2 Feature Extraction
		3.3 Deep Learning Model Architectures
	4 Experiments and Evaluation
		4.1 Evaluation Metrics
		4.2 Experiments
		4.3 Best Results
	5 Conclusions and Future Work
	References
Session Based Recommendations Using Recurrent Neural Networks - Long Short-Term Memory
	1 Introduction
	2 Methods of Content Recommendation
		2.1 Multi-Layer Perceptron
		2.2 Autoencoders
		2.3 Boltzmann Machines
	3 Evaluation of Recommendation Systems
		3.1 MAE
		3.2 MSE
		3.3 Precision
		3.4 Recall
	4 Using the LSTM as a Recommender System
		4.1 Recurrent Neural Networks
		4.2 Long Short-Term Memory
		4.3 Data Preparation
		4.4 Model Definition
	5 Results and Discussions
		5.1 Experiment
		5.2 Recall and Precision Results
	6 Conclusions and Future Work
	References
UVDS: A New Dataset for Traffic Forecasting with Spatial-Temporal Correlation
	1 Introduction
	2 Literature Review
		2.1 Traffic Forecasting Using Graph Neural Network
		2.2 Public Traffic Flow Datasets
	3 UVDS: Urban Vehicle Detection System Dataset
		3.1 Data Description and Research Challenges
		3.2 Graph Construction
	4 Baseline Results and Discussion
		4.1 Baseline Models
		4.2 Experimental Results
		4.3 Open Research Issues Using UVDS Dataset
	5 Conclusion
	References
A Parallelized Frequent Temporal Pattern Mining Algorithm on a Time Series Database
	1 Introduction
	2 A Frequent Temporal Inter-object Pattern Mining Task
	3 The Parallelized Frequent Temporal Inter-object Pattern Mining Algorithm on a Time Series Database
		3.1 BranchTree
		3.2 From BranchTree to PTP
	4 Empirical Evaluation
	5 Conclusion
	References
An Efficient Approach for Mining High-Utility Itemsets from Multiple Abstraction Levels
	1 Introduction
	2 Related Work
	3 Preliminaries
	4 Proposed Algorithm
	5 Evaluation Studies
	6 Conclusion and Future Work
	References
Mining Class Association Rules on Dataset with Missing Data
	1 Introduction
	2 Related Work
		2.1 Type of Missing Data
		2.2 Imputation Method
		2.3 Mining Class Association Rules
	3 Model for Mining Class Association Rules with Incomplete Datasets
		3.1 Definition
		3.2 Method
		3.3 Training Process
		3.4 Application Process
	4 Experimental Studies
	5 Conclusion and Future Work
	References
Machine Learning Methods
Clustering Count Data with Stochastic Expectation Propagation
	1 Introduction
	2 The Exponential-Family Approximation to MSD Distribution
	3 Stochastic Expectation Propagation
	4 EMSD Mixture Model
		4.1 Clustering Model
		4.2 Parameter Learning
	5 Experimental Results
		5.1 Synthetic Dataset
		5.2 Sentiment Analysis
	6 Conclusions
	References
Entropy-Based Variational Learning of Finite Generalized Inverted Dirichlet Mixture Model
	1 Introduction
	2 Model Specification
		2.1 Finite Generalized Inverted Dirichlet Mixture
	3 Model Learning with Variational Inference
	4 Entropy-Based Variational Model Learning
		4.1 Differential Entropy Estimation
		4.2 MeanNN Entropy Estimator
	5 Experimental Results
		5.1 Breast Cancer
		5.2 Image Analysis
	6 Conclusion
	References
Mixture-Based Unsupervised Learning for Positively Correlated Count Data
	1 Introduction
	2 Negative Multinomial Mixture Model
		2.1 Maximum Likelihood Parameter Estimation
	3 Model Selection
	4 Experimental Results
	5 Conclusion
	References
Phase Prediction of Multi-principal Element Alloys Using Support Vector Machine and Bayesian Optimization
	1 Introduction
	2 Description of Datasets
	3 Building Prediction Models with SVM
		3.1 Defining Predictors and an Outcome
		3.2 Tuning Hyperparameters Using Bayesian Optimization
		3.3 Cross-Validation of Prediction Models Employing Tuned Hyperparameters
	4 Statistical Analysis of Experimental Results
	5 Conclusions
	References
VEGAS: A Variable Length-Based Genetic Algorithm for Ensemble Selection in Deep Ensemble Learning
	1 Introduction
	2 Background and Related Work
		2.1 Ensemble Learning and Ensemble Selection
		2.2 Variable Learning Encoding in Evolutionary Computation
	3 Proposed Method
		3.1 Ensemble Selection for Deep Ensemble Systems
		3.2 Optimization Problems and Algorithm
	4 Experimental Studies
		4.1 Experimental Settings
		4.2 Comparison to the Benchmark Algorithms
		4.3 Discussions
	5 Conclusions
	References
Demand Forecasting for Textile Products Using Statistical Analysis and Machine Learning Algorithms
	1 Introducción
	2 Related Works
	3 Materials and Methods
		3.1 Case Study Description
		3.2 Statistical Analysis
		3.3 Demand Forecasting
	4 Results and Discussion
	5 Conclusions and Future Work
	References
Parallelization of Reinforcement Learning Algorithms for Video Games
	1 Introduction
	2 Background and Related Work
		2.1 Reinforcement Learning
		2.2 Methods for Solving RL Problems
		2.3 Parallelization of RL Methods
	3 Experiment
		3.1 Environment and Algorithms Parameters
		3.2 Measures
	4 Results
		4.1 Influence of Parallelization on Training Times
		4.2 Throughput Measurements
		4.3 System Performance Measurements
	5 Conclusions
	References
Decision Support and Control Systems
A Gap–Based Memetic Differential Evolution (GaMeDE) Applied to Multi–modal Optimisation – Using Multi–objective Optimization Concepts
	1 Introduction
	2 Contribution and Motivation
	3 Approach
		3.1 Archive Management
		3.2 Gap Selection Operator
		3.3 Two–Phased GaMeDE
		3.4 Clustering
		3.5 Local Optimization
	4 Experiments
		4.1 Setup
		4.2 Metrics
		4.3 Results
		4.4 Discussion
	5 Conclusions
	References
Simulating Emergency Departments Using Generalized Petri Nets
	1 Introduction
	2 Modelling Approach
		2.1 Data Collection and Processing
		2.2 Simulation Model
	3 Simulation Modeling
		3.1 The Proposed GSPN-Based Model
		3.2 The Hierarchical GSPN Model of the ED
	4 Simulation Results and Discussion
		4.1 Model Validation
		4.2 Forecasting Patients’ Waiting Times
	5 Conclusion
	References
What Do You Know About Your Network: An Empirical Study of Value Network Awareness in E-commerce
	1 Introduction
	2 Theoretical Background
		2.1 Value Network
		2.2 Network Awareness
	3 Overview of the Studies
		3.1 Sampling of Study 1 – Suppliers and Complementors
		3.2 Sampling of Study 2 – Online Sellers
		3.3 Sampling of Study 3 – End Customers
	4 Results
	5 Discussion
	6 Limitations and Future Research
	References
A Robust Approach to Employee Competences in Project Management
	1 Introduction
	2 Illustrative Example
	3 Model of Employee Competence Configuration Problem
	4 Method for Verifying the Set of Employee Competences
	5 Computational Examples
	6 Conclusions
	References
Key Aspects of Customer Intelligence in the Era of Massive Data
	1 Introduction
	2 Literature Review
		2.1 Research Process
		2.2 The Revolution of Customer Intelligence
	3 Theoretical Framework
		3.1 Resource-Based Theory
		3.2 A Resource-Based Framework of Customer Intelligence Management
	4 Key Aspects of Customer Intelligence in the Era of Massive Data
		4.1 Product/Service Aspect
		4.2 Price Aspect
		4.3 Promotion Aspect
		4.4 Place Aspect
		4.5 People Aspect
		4.6 Process Aspect
		4.7 Physical Evidence Aspect
	5 Conclusion
	References
How Spatial Data Analysis Can Make Smart Lighting Smarter
	1 Introduction
	2 Problem Statement
	3 Methodology
	4 Implementation
		4.1 Mapping of Linestrings to Road Shapes
		4.2 Assignment of Lights to Lit Areas
	5 Results
		5.1 Quality of Modelled Situations
		5.2 Estimation Efficiency
	6 Conclusions
	References
Natural Language Processing
Convolutional Neural Networks for Web Documents Classification
	1 Introduction
	2 Related Work
	3 Text Classification
	4 Methodology
		4.1 Dataset
		4.2 Model
		4.3 Evaluation
	5 Experimental Results
		5.1 Baseline Setup
		5.2 Multi-class Problem
		5.3 Input Variation
		5.4 Embedding Vectors Variation
		5.5 Language Transfer Learning
	6 Conclusions
	References
Sequential Model-Based Optimization for Natural Language Processing Data Pipeline Selection and Optimization
	1 Introduction
	2 Related Works
	3 Experiments
		3.1 Impact Analysis of Applied Different Preprocessing Step and Method
		3.2 Using Sequential Model-Based Optimization (SMBO) to Perform NLP Data Pipeline Hyperparameter Tuning
	4 Conclusion
	References
Automatic Cyberbullying Detection on Twitter Using Bullying Expression Dictionary
	1 Introduction
	2 Related Work
	3 Method Overview
	4 Bullying Expression Dictionary Construction
		4.1 Automatic Extraction of Bullying Words
		4.2 Calculation of Bullying Degrees of Registered Words
		4.3 Result
	5 Data Annotation
	6 Feature Extraction
		6.1 Bullying Expression
		6.2 N-gram
		6.3 Word2vec
		6.4 Doc2vec
	7 Machine Learning Algorithm Selection
	8 Experimental Evaluation
		8.1 Experiment Setup
		8.2 Experimental Results
		8.3 Discussion
	9 Conclusions
	References
Development of Morphological Segmentation for the Kyrgyz Language on Complete Set of Endings
	1 Introduction
	2 Related Works
	3 General Characteristics of the Kyrgyz Language
	4 Development of Kyrgyz Morphology’s CSE-Model
	5 Developing a Computational Data Models and an Algorithm of Morphological Segmentation
	6 Results of the Experiments
	7 Conclusion and Future Works
	References
Empirical Study of Tweets Topic Classification Using Transformer-Based Language Models
	1 Introduction
	2 Related Work
	3 Methodology
		3.1 BERT ch27BERT
		3.2 XLNet ch27XLNet
		3.3 RoBERTa ch27RoBERTa
		3.4 ALBERT ch27ALBERT
		3.5 Implementation Details
	4 Results and Discussions
	5 Conclusion
	References
A New Approach for Measuring the Influence of Users on Twitter
	1 Introduction
	2 Related Works
		2.1 PageRank
		2.2 HITS
		2.3 TunkRank
		2.4 TwitterRank
		2.5 Other Methods
	3 Proposed Methodology
		3.1 Activity Measures
		3.2 Popularity Measures
		3.3 Influence Measure
	4 Experimental Evaluation
		4.1 Datasets
		4.2 Evaluation
	5 Conclusion and Future Work
	References
Building a Domain-Specific Knowledge Graph for Business Networking Analysis
	1 Introduction
	2 Related Work
	3 BusinessNet Knowledge Graph
		3.1 Knowledge Graphs
		3.2 Methodology
	4 Sample Usage
		4.1 Node Classification Experiment
		4.2 Further Experimentation with BusinessNet
	5 Discussion
	6 Conclusion
	References
Cybersecurity Intelligent Methods
N-Tier Machine Learning-Based Architecture for DDoS Attack Detection
	1 Introduction
	2 Related Work
	3 Proposed Framework
		3.1 Dataset Preprocessing
		3.2 Feature Selection
		3.3 Multi-tier Architecture Intrusion Detection Model
	4 Experiments
		4.1 Evaluation Metrics
		4.2 Experiment Cases
	5 Conclusions
	References
Detection of Distributed Denial of Service Attacks Using Automatic Feature Selection with Enhancement for Imbalance Dataset
	1 Introduction
	2 Related Work
	3 Proposed Model
		3.1 Data Preprocessing
		3.2 Feature Selection
		3.3 Classification
		3.4 Objective Function and Learning Method
	4 Experiment and Discussion
		4.1 CIC-DDoS 2019 Dataset
		4.2 System\'s Performance
		4.3 Result Analysis
	5 Conclusion
	References
AntiPhiMBS: A New Anti-phishing Model to Mitigate Phishing Attacks in Mobile Banking System at Application Level
	1 Introduction
	2 Background
	3 Proposed Anti-phishing Model For Mobile Banking System
		3.1 Architecture of Anti-phishing Model AntiPhiMBS
		3.2 Verification of Proposed Anti-phishing Model AntiPhiMBS
	4 Results and Discussion
	5 Conclusion and Future Work
	References
Missing and Incomplete Data Handling in Cybersecurity Applications
	1 Introduction
	2 What Missing Data Is, and the Notion of Data Quality
		2.1 Patterns of Missingness
		2.2 Dealing with Missing Values
	3 Exploring Solutions
	4 Experimental Setup and Results
		4.1 Dataset Preparation
		4.2 Results
		4.3 Summary of Results
	5 Conclusion
	References
An Experimental Study of Machine Learning for Phishing Detection
	1 Introduction
	2 Related Work
		2.1 Rule-Based Methods
		2.2 ML-Based Methods
	3 Methodology
		3.1 Text Classification
		3.2 Object Detection
		3.3 Image Matching
		3.4 Datasets
		3.5 Models
		3.6 Evaluation
	4 Experimental Results
		4.1 Classic ML Model vs. Deep Learning Model for the URL Classification Problem
		4.2 Classic ML Model vs. Deep Learning Model for the HTML Classification Problem
		4.3 Object Detection Experiments
		4.4 Ensemble Model Configurations
	5 Conclusions
	References
Computer Vision Techniques
Model for Application of Optical Passive SFM Method in Reconstruction of 3D Space and Objects
	1 Introduction
	2 Background
		2.1 Stereo Vision
		2.2 Image Features
	3 Methodology
	4 Results
	5 Conclusion
	References
Ground Plane Estimation for Obstacle Avoidance During Fixed-Wing UAV Landing
	1 Introduction
	2 Related Work
	3 Proposed Approach
	4 Results
	5 Conclusions and Future Work
	References
UAV On-Board Emergency Safe Landing Spot Detection System Combining Classical and Deep Learning-Based Segmentation Methods
	1 Introduction
	2 System Architecture
	3 Obtaining Map of Areas Suitable for Landing
	4 Landing Site Detection
	5 From Image Pixel Coordinates to the Geographic Coordinate System
	6 Testing Environments
	7 Conclusion and Future Work
	References
Wasserstein Generative Adversarial Networks for Realistic Traffic Sign Image Generation
	1 Introduction
	2 Related Work
		2.1 Generative Adversarial Networks (GAN) and (WGAN)
		2.2 Performance Evaluation Method
	3 Methodology
		3.1 WGAN Architecture
		3.2 Experiment Setting for WGAN
	4 Experiment and Result
		4.1 Training WGAN
		4.2 Discussions and Results
	5 Conclusions
	References
An Approach to Automatic Detection of Architectural Façades in Spherical Images
	1 Introduction
	2 Architectural Façade Detection, Separation and Rectification
	3 Generating Training and Validation Datasets
	4 Acquiring Real Spherical Photos
	5 Analysis of Experimental Results
	6 Conclusions and Future Work
	References
Computational Imaging and Vision
Real-Time Multi-view Face Mask Detector on Edge Device for Supporting Service Robots in the COVID-19 Pandemic
	1 Introduction
	2 Proposed Architecture
		2.1 Face Detector
		2.2 Face Masks Classification Module
	3 Implementation Setup
	4 Experimental Results
		4.1 Face Detector Results
		4.2 Face Masks Classification Results
		4.3 Runtime Efficiency
	5 Conclusion
	References
Eye State Recognizer Using Light-Weight Architecture for Drowsiness Warning
	1 Introduction
	2 Related Work
		2.1 Untraining Methodologies
		2.2 Training Methodologies
	3 Methodology
		3.1 Eye Detection Network
		3.2 Eye Classification Network
	4 Experimental Result
		4.1 Dataset Preparation
		4.2 Experimental Setup
		4.3 Experimental Result
	5 Conclusion and Future Work
	References
NovemE - Color Space Net for Image Classification
	1 Introduction
	2 Previous Works
	3 Preliminary Analysis
	4 Proposed Model
		4.1 Choice of Base Learners
		4.2 Ensemble Approach
	5 Results
	6 Conclusion
	References
Application of Improved YOLOv3 Algorithm in Mask Recognition
	1 Introduction
	2 YOLOv3
		2.1 The Principle of YOLOv3
		2.2 Improved Activation Function
		2.3 Improved Feature Detection Network
		2.4 Improved Priors Anchor Algorithm
	3 Experimental Results
		3.1 Data Collection and Processing
		3.2 Data Set Preprocessing
		3.3 Network Model Training
		3.4 Experimental Results
	4 Conclusion
	References
Simulation and Experiment in Solving Inverse Kinematic for Human Upper Limb by Using Optimization Algorithm
	1 Introduction
	2 Human Arm with E-HMCS Model Description
		2.1 Model Description
		2.2 Forward Kinematic Analysis
	3 Proposed Optimization Algorithm
	4 Experiments and Proposed Algorithm Setup
		4.1 Experiment Setup for ADL
		4.2 Proposed Algorithm Setup
	5 Results and Discussion
		5.1 Drinking Water Task
		5.2 Brushing Teeth Task
	6 Conclusion
	References
Word Segmentation for Gujarati Handwritten Documents
	1 Introduction
		1.1 Literature Review
	2 Proposed Work
		2.1 Methodology
		2.2 Disadvantages
	3 Results
		3.1 Dataset
		3.2 Binarization Results
		3.3 Final Output
	4 Conclusion
	References
Advanced Data Mining Techniques and Applications
A SPEA-Based Group Trading Strategy Portfolio Optimization Algorithm
	1 Introduction
	2 Related Work
	3 Components of the Proposed Algorithm
		3.1 Encoding Scheme
		3.2 Two Used Objective Functions
		3.3 Genetic Operations
	4 Proposed SPEA-Based GTSP Optimization Algorithm
	5 Experimental Evaluations
	6 Conclusions and Future Work
	References
Develop a Hybrid Human Face Recognition System Based on a Dual Deep Neural Network by Interactive Correction Training
	1 Introduction
	2 Related Works
	3 Dual Face Recognition Model Interaction Calibration Training System
		3.1 Users Registration and Face Recognition
		3.2 Module Update Algorithm
		3.3 Divergent Predicted Results
	4 Experimental Design
	5 Experimental Results
		5.1 Accuracy
		5.2 ROC-AUC
		5.3 Update Record Comparison
	6 Conclusion
	References
Forecasting Stock Trend Based on the Constructed Anomaly-Patterns Based Decision Tree
	1 Introduction
	2 Definitions and Problem Statement
	3 Proposed Approach
		3.1 Flowchart of the Proposed Approach
		3.2 Pseudo Code of Proposed Algorithm
	4 Experimental Evaluations
		4.1 Dataset Description
		4.2 The Generated Anomaly-Pattern-Based Decision Trees
	5 Conclusions and Future Work
	References
A Transparently-Secure and Robust Stock Data Supply Framework for Financial-Technology Applications
	1 Introduction
	2 Proposed Send-and-Subscribe (SaS) Framework
		2.1 System Architecture
		2.2 Data Retrieval Example in FinTech Applications
	3 Core Functional Mechanisms
		3.1 Scalability-Based Parallel Data Processing Mechanism
		3.2 MQ-Based Data Retrieval Protocol
		3.3 Customized Coding Methods for Message Queue Systems
	4 Experimental Results
		4.1 Scalability Test of the Proposed SaS Framework
	5 Conclusions and Future Work
	References
Comparison of Machine Learning Methods for Life Trajectory Analysis in Demography
	1 Introduction
	2 Data Description
	3 Decision Trees
		3.1 Typical Patterns that Distinguish Men and Women
		3.2 Prediction of the Next Event in Personal Life Trajectories
	4 Using Customized Kernels in SVM
		4.1 Classification by Sequences, Features, and the Weighted Sum of Their Probabilities
		4.2 Classification by Features and Categorical Encoding of Sequences
	5 Neural Network Models
	6 Comparison of Methods
	7 Conclusion
	References
An Efficient Method for Multi-request Route Search
	1 Introduction
	2 Related Work
	3 Proposed Method
		3.1 Data Pre-processing
		3.2 Pruning and Wilting
	4 Experimental Evaluation
		4.1 Data Collection
		4.2 Method Competition
	5 Conclusion and Future Work
	References
Machine Learning Model for the Classification of Musical Composition Genres
	1 Introduction
	2 Background
	3 Research
	4 Results and Discussion
	5 Conclusion
	References
Intelligent and Contextual Systems
Emotional Piano Melodies Generation Using Long Short-Term Memory
	1 Introduction
	2 Literature Review
	3 Methods and Materials
		3.1 Automatic Melody Generation Architecture
		3.2 Data Collection and Preparation
		3.3 Data Preprocessing
		3.4 Long Short-Term Memory
	4 Experimental Result
	5 Conclusion and Future Work
	References
SE-U-Net: Contextual Segmentation by Loosely Coupled Deep Networks for Medical Imaging Industry
	1 Introduction
	2 Backgrounds
		2.1 Object Detection Deep Networks
		2.2 Segmentation Deep Networks for Medical Images
	3 Proposed Contextual Segmentation Scheme
		3.1 Overall Architecture
		3.2 Context Matrix Transformation
		3.3 Computing Expansive Features with Context Matrice
		3.4 Discussions: What Does SE-U-Net Do?
	4 Case Study
		4.1 System Deployment and Experimental Settings
		4.2 Expr. 1: Visualization Effects of Context Segmentation
		4.3 Expr. 2: Comparisons of Segmentation Methods
		4.4 Expr. 3: Quantitative Comparisons
	5 Conclusions and Future Work
	References
Contextual Soft Dropout Method in Training of Artificial Neural Networks
	1 Introduction
	2 Soft Dropout in Neural Networks Training
	3 Contextual Soft Dropout Method
	4 Results of Experiments
	5 Conclusions
	References
Bone Age Assessment by Means of Intelligent Approaches
	1 Introduction and Motivation
	2 Bone Age Estimation
	3 Related Works
	4 Proposed Approach
	5 Conclusions and Future Plans
	References
Random Number Generators in Training of Contextual Neural Networks
	1 Introduction
	2 Principles of Contextual Neural Networks
	3 Influence of PRNGs Using in Machine Learning
	4 Results of Experiments
	5 Conclusions
	References
The Impact of Aggregation Window Width on Properties of Contextual Neural Networks with Constant Field of Attention
	1 Introduction
	2 Generalized BP and Contextual Neural Networks
	3 Windowed Attention of Contextual Neurons
	4 Results of Experiments
	5 Conclusions
	References
Towards Layer-Wise Optimization of Contextual Neural Networks with Constant Field of Aggregation
	1 Introduction
	2 Contextual Neural Networks
	3 Not-Uniform Patterns of Connections Grouping in CxNNs
	4 Results of Experiments
	5 Conclusions
	References
Commonsense Knowledge, Reasoning and Programming in Artificial Intelligence
Community Detection in Complex Networks: A Survey on Local Approaches
	1 Introduction
	2 Preliminaries and Background
	3 Locality Exploration Scheme (LES)
		3.1 Input Data
		3.2 Community Detection Flow
		3.3 Output Communities
	4 Analyzing Existing Algorithms Based on LCE
	5 Conclusion
	References
A Q-Learning Based Hyper-Heuristic for Generating Efficient UAV Swarming Behaviours
	1 Introduction
	2 Related Work
	3 CCUS Model
		3.1 Formal Expression
		3.2 Representation of Solutions
		3.3 Coverage Objective
		3.4 Connectivity Objective
	4 QLHH Algorithm
		4.1 Structure
		4.2 Detailed Steps
		4.3 General Pseudo-code
	5 Experiments
		5.1 Comparison Heuristic
		5.2 Performance Metrics
		5.3 Experimental Setup
		5.4 Experimental Results
	6 Conclusion
	References
Cross-Domain Co-Author Recommendation Based on Knowledge Graph Clustering
	1 Introduction
	2 Background Study
	3 Methodology
		3.1 Our Approach
		3.2 Research Area Clustering Based on Knowledge Graph Embedding
	4 Recommendation Model
		4.1 Data Pre-processing
		4.2 Model Evaluation
	5 Qualitative Results
	6 Conclusion
	References
Data Modelling and Processing for Industry 4.0
Trident: Change Point Detection for Multivariate Time Series via Dual-Level Attention Learning
	1 Introduction
	2 Trident Design
		2.1 Time Series Prediction Module
		2.2 Anomaly Detection Module
		2.3 Change Points Selection Module
	3 Experiment and Evaluation
		3.1 Experimental Environments
		3.2 Datasets Introduction
		3.3 Results 1: Prediction Performance
		3.4 Results 2: Change Point Detection Performance
	4 Conclusion
	References
Facial Representation Extraction by Mutual Information Maximization and Correlation Minimization
	1 Introduction
	2 Related Work
		2.1 Mutual Information Learning
		2.2 Orthogonal Facial Representation Learning
	3 Proposed Method
		3.1 Deep Neural Network Structure
		3.2 Mutual Information Loss
		3.3 Correlation Loss
	4 Experiments
		4.1 Databases and Preprocessing
		4.2 Experiments Based on the Identity Representation
		4.3 Experiments Based on the Emotional Representation
	5 Conclusion
	References
Localization System for Wheeled Vehicles Operating in Underground Mine Based on Inertial Data and Spatial Intersection Points of Mining Excavations
	1 Introduction
	2 Input Data Description and Pre-processing
	3 Path Calculation and Its Integration with the Map
	4 Path Correction
	5 Signal Correction
	6 Summary
	References
Innovations in Intelligent Systems
Evaluating Mutation Operator and Test Case Effectiveness by Means of Mutation Testing
	1 Introduction
	2 Related Works
		2.1 Second-Order Mutation Testing
		2.2 Higher-Order Mutation Testing
	3 Research Questions
	4 The Proposed Approach
		4.1 Projects Under Test (PUTs)
		4.2 Supporting Tool
		4.3 The Approach
	5 Empirical Results and Analysis
		5.1 Answer to RQ1
		5.2 Answer to RQ2
	6 Conclusions and Future Work
	References
Usability Study of Mobile Applications with Cognitive Load Resulting from Environmental Factors
	1 Introduction
	2 Related Works
	3 Setup of Usability Experiments
		3.1 Selection of Mobile Applications
		3.2 Environments and Groups of Participants
		3.3 Task Scenario and Metrics Collected
		3.4 Statistical Analysis Approach
	4 Results of Usability Testing
	5 Conclusions
	References
Author Index




نظرات کاربران