𝔖 Scriptorium
✩   LIBER   ✩

📁

Intelligent Systems and Applications: Proceedings of the 2022 Intelligent Systems Conference (IntelliSys) Volume 3 (Lecture Notes in Networks and Systems, 544)

✍ Scribed by Kohei Arai (editor)


Publisher
Springer
Year
2022
Tongue
English
Leaves
859
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✩ Synopsis


This book is a remarkable collection of chapters covering a wide domain of topics related to artificial intelligence and its applications to the real world. The conference attracted a total of 494 submissions from many academic pioneering researchers, scientists, industrial engineers, and students from all around the world. These submissions underwent a double-blind peer-reviewed process. Of the total submissions, 176 submissions have been selected to be included in these proceedings.

It is difficult to imagine how artificial intelligence has become an inseparable part of our life. From mobile phones, smart watches, washing machines to smart homes, smart cars, and smart industries, artificial intelligence has helped to revolutionize the whole globe. As we witness exponential growth of computational intelligence in several directions and use of intelligent systems in everyday applications, this book is an ideal resource for reporting latest innovations and future of AI. Distinguished researchers have made valuable studies to understand the various bottlenecks existing in different arenas and how they can be overcome with the use of intelligent systems. This book also provides new directions and dimensions of future research work.

We hope that readers find the volume interesting and valuable.



✩ Table of Contents


Editor’s Preface
Contents
How to Improve the Teaching of Computational Machine Learning Applied to Large-Scale Data Science: The Case of Public Universities in Mexico
1 Introduction
2 Related Work
3 Methodology
3.1 Population
3.2 Survey
3.3 Data Analysis
4 Results and Discussion
5 Conclusions
References
Fingerprinting ECUs to Implement Vehicular Security for Passenger Safety Using Machine Learning Techniques
1 Introduction
2 Threat Model
2.1 Spoofing Attack
2.2 Fabrication Attack
2.3 Bus-Off Attack
3 Related Work
3.1 MAC Based Approach
3.2 Parameter Monitoring IDS Approach
3.3 Information Theory IDS Approach
3.4 Machine Learning IDS Approach
3.5 Fingerprinting IDS Approach
4 Data Acquisition and Preprocessing
4.1 Data Collection
4.2 Pulse Segmentation
4.3 Feature Extraction
4.4 Outlier Removal
5 Model Selection and Parameter Tuning
5.1 K-Nearest Neighbor
5.2 Gaussian Naive Bayes
5.3 Multinomial Logistic Regression
5.4 Model Tuning and Parameter Selection
6 Model Validation and Results
7 Conclusion
References
Knowledge Graph Enrichment of a Semantic Search System for Construction Safety
1 Introduction
2 Related Work
3 Method
3.1 Triple Extraction
3.2 Entity and Relation Linking
3.3 Integration of the Knowledge Graph in the Semantic Search Interface
4 Evaluation
4.1 Evaluation Metrics
4.2 Results of Entity-Relation-Triple Linking and Triple Extraction
4.3 Qualitative Error Analysis
5 Conclusion
References
Leboh: An Android Mobile Application for Waste Classification Using TensorFlow Lite
1 Introduction
2 Literature Review
3 Method
4 Experimental Results and Discussions
4.1 Data
4.2 Experimental Results
4.3 Discussions
5 Conclusion
References
Mobile Application for After School Pickup Solution: Malaysia Perspectives
1 Introduction
2 The Prototype Design of the Proposed School Pickup Application System
3 The User Interface Design of School Pickup System
4 Security Features
5 Prototype Functionality Testing Results
6 Conclusion
References
Were Consumers Less Price Sensitive to Life Necessities During the COVID-19 Pandemic? An Empirical Study on Dutch Consumers
1 Introduction
2 Theoretical Background and Literature Review
2.1 Price Elasticity of Demand
2.2 Life Necessities
2.3 Panic Buying Behavior
2.4 Hypotheses Development
3 Data, Variables and the Proposed PED Model
3.1 Data
3.2 Variables
3.3 The Proposed PED Model
4 Findings and Discussion
5 Concluding Remarks and Future Work
References
Eigen Value Decomposition Utilizing Method for Data Hiding Based on Wavelet Multi-resolution Analysis
1 Introduction
2 Related Research Works
3 Theoretical Background and Proposed Method
3.1 Theoretical Background
3.2 Proposed Method
4 Experiment
4.1 Data Used
4.2 Evaluation Function
4.3 Evaluation Procedure
4.4 Preliminary Experimental Result
4.5 Simulation Result
4.6 Experimental Result with Remote Sensing Satellite Image
5 Conclusion
6 Future Research Works
References
Long Short-Term Memory Neural Network for Temperature Prediction in Laser Powder Bed Additive Manufacturing
1 Introduction
2 Related Work in Laser Powder Bed Additive Manufacturing
3 Heat Transfer Model and TSP Formulation
3.1 Heat Simulation Framework
3.2 TSP-Based Formulation
4 The LSTM Approach
5 Results
6 Conclusion
References
Detection and Collection of Waste Using a Partially Submerged Aquatic Robot
1 Introduction
2 Background Concepts and Related Work
2.1 Background Concepts
2.2 Related Work
3 Solution Design and Implementation
3.1 Hardware Design
3.2 Software Design
4 Solution Evaluation and Testing
4.1 Testing is based on Four Factors
4.2 Can the Object Detection System Detect Waste?
4.3 How well does the Object Detector Cope with Movement?
4.4 Can the Robots still Detect Waste in Relatively Low Light Conditions?
4.5 Can the Robot Collect Waste?
5 Future Work and Conclusion
References
Detecting Complex Intrusion Attempts Using Hybrid Machine Learning Techniques
1 Introduction
1.1 Intrusion Detection Systems
1.2 Supervised and Unsupervised Learning
1.3 Problem Statement
1.4 Paper Structure and Contributions
2 Literature Review
2.1 Datasets
2.2 Previous Work
2.3 Research Gap
3 Research Approach
3.1 Prediction Method
3.2 Evaluation Criteria
3.3 Data Cleanup and Exploratory Data Analysis
4 Modelling
4.1 Train – Test Split
4.2 Metrics for Evaluation
4.3 Unsupervised Machine Learning Models
4.4 Hybrid Approach (Unsupervised then Supervised)
5 Results and Conclusions
References
Gauging Biases in Various Deep Learning AI Models
1 Introduction
2 Experimental Setting
3 Experimental Results
3.1 Raw Data
3.2 Model Training
3.3 Optimizers
3.4 Visualization of Weights and Biases
4 Discussion of Results
4.1 The Impact of Previous Work and Bibliography
4.2 Model Testing
4.3 Math Explanation of Causes of Biases
4.4 Our Implementation: An Assure AI Mobile App
5 Concluding Observations and Future Work
References
Improving Meta-imitation Learning with Focused Task Embedding
1 Introduction
2 Related Work
3 Preliminaries
4 Method
4.1 Object Network
4.2 Skill Network
4.3 Control Policy
4.4 Task Segmentation
5 Experiments
5.1 Data Preprocessing
5.2 Learning Object Domain in Multi-skill Setting
5.3 Learning Skill Domain in Multi-object Setting
6 Conclusions
References
Firearm Detection Using Deep Learning
1 Introduction
2 Related Work
3 Methodology
3.1 Dataset Collection and Augmentation
3.2 Model Training
3.3 Evaluation Metrics
4 Experiments and Results
4.1 Environment Origin
4.2 Dataset Segregation
4.3 Hyper Parameters Tuning
4.4 Pragmatic Analysis
5 Conclusions and Amelioration
References
PID Parameter Tables for Time-Delayed Systems, Found with Learning Algorithms According to Minimum IAE, ITAE and ISE Criteria
1 Introduction and Related Work
2 Modelling of Time-Delayed Systems
2.1 Time Percentage Value Method
3 Calculation of the Optimal Parameters for PID Controllers with the Minimization of the Quality Criteria IAE, ITAE and ISE
4 Table for the PID Control Parameters After Minimizing the Quality Criteria IAE, ITAE and ISE
5 Application of the PID Parameter Table: Control of a PT2 System
6 Discussion and Outlook
References
Principles of Solving the Symbol Grounding Problem in the Development of the General Artificial Cognitive Agents
1 Introduction
2 Multisensory Integration
3 Construction of an Associative Heterarchical Network of Concepts to Solve the Problem of Symbol Grounding and Its Possible Solution
4 Expansion of the Hybrid Architecture of an Artificial Cognitive Agent, Taking into Account the Problem of Symbol Grounding
5 Conclusion
References
Enabling Maritime Digitalization by Extreme-Scale Analytics, AI and Digital Twins: The Vesselai Architecture
1 Introduction
2 Background
3 VesselAI High-Level Architecture
4 Conclusions and Next Steps
References
Computing with Words for Industrial Applications
1 Introduction
2 Computing with Words
3 CWIPY Methodology and Library
3.1 Hedges in CWiPy
3.2 Quantifiers in CWiPy
3.3 Architecture of CWiPy
4 Application and Results
4.1 Intelligent Retrieval of Rental Apartments Data
4.2 Generation of Linguistic Database Summaries
5 Conclusion
References
Improving Public Services Accessibility Through Natural Language Processing: Challenges, Opportunities and Obstacles
1 Artificial Intelligence, Public Administrations and Natural Language Processing
1.1 A Subsection Sample
2 The easyRights Pathway Generator
2.1 Context of Application: The EasyRights Project
2.2 Natural Language Understanding Tasks for Administrative Procedural Documents
2.3 The EasyRights Conceptual Framework in the Pathway Generator
3 Early Testing and Results
3.1 Overview of the Underpinned Process
3.2 Obstacles and Barriers
4 Conclusions and Open Questions: Challenges for Public Administrations
4.1 Public Administration’s Readiness to Exploit AI Potentials
4.2 Requirements for Administrative Procedural Documents
References
Neural Machine Translation for Aymara to Spanish
1 Introduction
2 Native Language Aymara
2.1 Population that Has the Language as Their Mother Tongue
2.2 Aymara Writing
2.3 Registered Interpreters and Translators
3 Aymara Prayer and Its Elements
4 Methodology
4.1 Data Collections
4.2 Reprocessing
4.3 Modeling
4.4 Results
5 Conclusion
6 Future Work
References
Hand Gesture and Human-Drone Interaction
1 Introduction
1.1 Problem Formulation
1.2 Gesture Recognition
2 Background
2.1 Devices for Gesture Recognition
2.2 Algorithms for Gesture Recognition
3 Implementation
3.1 Image Processing
3.2 Mapping Hand Gesture with the Drone Behavior
3.3 Code
4 Conclusion
References
Design and Develop Hardware Aware DNN for Faster Inference
1 Introduction
2 Literature Survey
3 Proposed Approach
3.1 Hardware Metrics
3.2 Hardware Aware Pruning
3.3 Customization of Model-Based on Pruning
3.4 Retraining Post Customization
3.5 Fusion
3.6 Quantization
4 Experimentation and Results
5 Conclusions
References
Vision Transformers for Medical Images Classifications
1 Introduction
2 Background
2.1 Convolutional Neural Network (CNN)
2.2 Residual Neural Networks (RNN)
2.3 Vision Transformers (VT)
3 Methodology
4 Dataset Description and Preprocessing
5 Results
6 Conclusion
References
A Survey of Smart Classroom: Concept, Technologies and Facial Emotions Recognition Application
1 Introduction
2 Smart Classroom: Definition and Technologies
2.1 Definition of Smart Classroom
2.2 Smart Classroom Technologies
3 The Application of FER System to Smart Classroom
3.1 FER Approaches Used for Smart Classroom
3.2 FER Student's Databases
4 Insights and Future Work
5 Conclusion
References
The Digital Twin for Monitoring of Cargo Deliveries to the Arctic Territories
1 Introduction
2 Materials and Methods
3 Results and Their Discussion
3.1 The “DIgital Twin”
3.2 Arranging of Works on Creation of the Digital Twin: A Product-Based Approach
4 Conclusion
References
Intelligent Bixby Recommender Systems
1 Introduction
1.1 Embeddings
1.2 Alternating Least Squares (ALS)
2 Background
3 Methodology and Experiments
3.1 Methodology
3.2 Experiments
4 Results and Observations
5 Comparison of Approaches and Future Work
5.1 Initial Approach
5.2 Latest Approach
5.3 Future Work
6 Conclusion
References
A Deep Reinforcement Learning Algorithm Using A New Graph Transformer Model for Routing Problems
1 Introduction
2 Related Work
2.1 Traditional Algorithms for Solving Routing Problems
2.2 DRL-Based Methods for Solving Routing Problems
3 The Model Architecture
3.1 Encoder
3.2 Decoder
4 DRL Training with Shared Baseline
5 Experiments
5.1 Experimental Environment and Hyperparameters
5.2 Experiments for TSP
5.3 Experiments for CVRP
5.4 Generalization Ability for Routing Problems
6 Conclusions and Future Work
References
Building a Fuzzy Expert System for Assessing the Severity of Pneumonia
1 Introduction
2 Related Works
3 Preliminary
4 Model and Implementation
5 Experimental Analysis and Results
6 Conclusion
References
Evaluating Suitability of a Blockchain Platform for a Smart Education Environment
1 Introduction
2 Methodology
3 Quality Requirements for a Blockchain-Based Smart Education Environment
4 Blockchain Network Types for Smart Learning Environments
4.1 Public Blockchain Network
4.2 Private Blockchain Network
4.3 Consortium Blockchain Network
5 Consensus Mechanisms Comparison
5.1 Compute-Intensive Consensus Algorithms
5.2 Capability Consensus Algorithms
5.3 Voting Consensus Algorithms
6 Blockchain Platforms
7 Results of a Suitable Blockchain Platform for a Smart Education Environments
8 Conclusion
References
Towards End-to-End Chase in Urban Autonomous Driving Using Reinforcement Learning
1 Introduction
1.1 Autonomous Vehicle
1.2 CARLA
2 Materials and Methods
2.1 Related Work
2.2 Experimental Setup
3 Results
3.1 Autonomous Driving from Point A to B
3.2 Autonomous Car Chase
4 Conclusions
References
Methodology for Training Artificial Neural Networks for Islanding Detection of Photovoltaic Distributed Generators
1 Introduction
2 Islanding in Electrical Power Systems
3 Electrical Model
4 Proposed Algorithm for Island Detection
4.1 Training Set
4.2 Test Set
5 Discussion
5.1 Islanding
5.2 Artificial Neural Networks (ANNs)
6 Results
7 Conclusions
References
Using the Cramer-Gauss Method to Solve Systems of Linear Algebraic Equations with Tridiagonal and Five-Diagonal Coefficient Matrices
1 Introduction
2 The Main Idea of the Cramer-Gauss Method
3 The Case of the Tridiagonal Matrix
3.1 Deriving a Formula for Calculating the Determinant of a Tridiagonal Matrix
3.2 Derivation of a Formula for Solving a System of Linear Algebraic Equations with a Tridiagonal Matrix of System Coefficients Using the Cramer-Gauss Method
4 The Case of the Five-Diagonal Matrix
4.1 Derivation of a Formula for Calculating the Determinant of a Five-Diagonal Matrix
4.2 Derivation of a Formula for Solving a System of Linear Algebraic Equations with a Five-Diagonal Matrix of System Coefficients Using the Cramer-Gauss Method
5 Iterative Cramer's Algorithm
5.1 Results of Numerical Experiments
6 Conclusion
References
An Interoperable Cloud Platform for the Garment Industry
1 Introduction
2 Background
2.1 Cloud Computing and Reference Architectures
2.2 Microservice Architectures
2.3 Deployment
2.4 Logic Architectures Derivation
3 Case Study
3.1 Cloud Requirements
3.2 Logic Architecture
3.3 Deployment Architecture
4 Conclusions
References
Optimal Scheduling of Processing Unit Using Convolutional Neural Network Architecture
1 Introduction
2 Literature Survey
3 Proposed Methodology
4 Experimental Results
5 Conclusion
6 Future Work
References
Facial Gesture Recognition for Drone Control
1 Introduction
2 Methodology
2.1 The EEG Signals
2.2 Signal Capture and Conditioning
2.3 Subject Preparation
2.4 Signal Acquisition and Processing
2.5 Artificial Neural Network
2.6 Drone
3 Results
4 Conclusions and Future Work
References
Job Recommendation Based on Extracted Skill Embeddings
1 Introduction
2 Methodology
2.1 Datasets
2.2 Job Recommendation Framework
3 Ranking Algorithms
3.1 Word Mover's Distance Approach
3.2 Cosine Similarity Approach
4 Experiments and Results
4.1 Data Preparation
4.2 Feature Selection
4.3 Evaluation
5 Conclusion
References
Hard Samples Make Difference: An Improved Training Procedure for Video Action Recognition Tasks
1 Introduction
2 Related Work
2.1 Convolutional Networks for Video Processing
2.2 Self-attention Mechanism in Convolutional Networks
2.3 Vision Transformers
3 Building Blocks Overview
3.1 Video Swin Transformer
3.2 Hard Negative Mining
4 Method Description
4.1 Limitations of Existing Training Approaches on Video Data
4.2 Proposed Training Approach
5 Results
5.1 Setup
5.2 Results
6 Ablation Study
6.1 Selecting Proper Number of Clusters for K-Means
6.2 Importance of Oversampling Hard and Removing Simple Samples
7 Conclusion
References
Similarity-Based Résumé Matching via Triplet Loss with BERT Models
1 Introduction
2 Methodology
2.1 Preliminaries
2.2 Data Set
2.3 Pretraining
2.4 Clustering
2.5 Fine-Tuning with Triplet Loss
2.6 Embedding Extraction and Similar Retrieval
3 Experiments and Results
3.1 Clustering Algorithms Performance Evaluation
3.2 Recommendation System Performance Evaluation
4 Conclusion
References
IOT Based Crowd Management Tool
1 Introduction
1.1 Problem Statement and Significance
1.2 Proposed Solution (System)
1.3 Project Domain and Limitations
2 Literature Review
2.1 IoT Based Counting System [3]
2.2 Wireless and Sensor Technology and Crowd Management [4]
3 Methodology
3.1 Interview Results
3.2 System Design
4 Expected Results
5 Conclusion
References
The Growing Need for Metaverse Regulation
1 Background
2 The Metaverse: Potential Dangers
3 The Metaverse: Non-regulatory Solutions
4 The Metaverse: Regulatory Solutions
5 The Metaverse: Is It Worth It?
References
Weak Supervision Can Help Detecting Corruption in Public Procurement
1 Introduction
2 Weak Supervision Setup
2.1 Data
2.2 Methods
3 Using Data Programming to Gauge Corruption in EU Public Procurement
4 Experiments
4.1 Data
4.2 Data Analysis and Results
5 Conclusion and Discussion
References
Applicability of Systems Engineering for Intelligent Transportation Systems: A Roadmap for Model-Based Approach to Manage Future Mobility Needs
1 Introduction
2 SE, SE Methodologies and Engineering Modelling Techniques
3 SE Vision 2025 Alignment in Automotive Industry
4 Aligning: Automotive System(s) Development Using Model-Based Methodologies
5 Automotive Trends, Challenges and Future Key-Enablers for SE Alignment in Automotive
References
Implementation of Two-Layered Dynamic Pragmatics
1 The Main Purpose: Modeling Information Exchange in Hungarian via a Multiagent System
2 Topics, Events, Standings, Phases
3 Methods I (First Approximation): Finite-State Automata to Formulate Transitions from Phase to Phase
4 Methods II: Integration of Discourse Markers as Transition-Rule Modifying Linguistic Elements
5 Methods III: Automata Equipped with a Memory Stack to Capture Users’ Complex Decision-Making Mechanisms
6 A Few Comments on the Functioning of the Program
7 Summary, Improvement, Applications, Future Research
References
Ambient Intelligence Security Checks: Identifying Integrity Vulnerabilities in Industry Scripts
1 Introduction
1.1 Ambient Intelligent System Deployment Automation
1.2 Vulnerability Detection in Automation Scripts
2 Static Analysis Tools
2.1 PowerShell PSScriptAnalyzer
2.2 ScriptCop PowerShell Analyzer
3 Tool Integrity Checking Weakness Identification
3.1 Higher Risk Integrity Algorithms
3.2 Weaker Integrity Algorithms Collisions
4 Research Problem/Significance
5 Review of Related Research
6 Methodology
6.1 PowerShell PSScriptAnalyzer
6.2 PowerShell ScriptCop
7 Findings/Analysis
8 Future Work
9 Conclusions
References
Demystifying xAOSF/AOSR Framework in the Context of Digital Twin and Industry 4.0
1 Introduction
2 Digital Twin and xAOSF/AOSR Framework
3 Big Data Analytics in CPS-Based Digital Twin
4 Conclusion and Future Work
References
Mitigating IoT Enterprise Vulnerabilities Using Radio Frequency Security Architecture
1 Introduction
2 Traditional and Modern Radio Frequency Systems
3 Proposed Design Model
4 RF Data Preprocessing and Labelling
5 Managing Processed RF Data on Cloud Environment
6 Training Radio Frequency Data for Authentication
7 Conclusion
References
Tantrum-Track: Context and Ontological Representation Model for Recommendation and Tracking Services for People with Autism
1 Introduction
2 Related Works
3 Tantrum-Track Intelligent Recommendation System
3.1 Overall Framework
3.2 Overall Framework Description
3.3 System End Users
4 Context Representation Model
4.1 Elements
5 Intelligent Recommendation System
5.1 Case-Based Reasoning
5.2 Collaborative Filtering Algorithm
6 Architecture and Detailed Design of Recommendation Model
6.1 IoT Communication Style
6.2 Observer–Observable Architectural Pattern
6.3 Algorithms and Techniques
7 Discussion
8 Conclusions
References
Video Analysis of Solid Flame Combustion of the Ni-Al System
1 Introduction
2 Experimental Part
3 Results and Discussion of the Experiment
4 Main Conclusions
References
Intrusion Detection System for Industrial Network
1 Introduction
2 Research Background
3 Intrusion Detection System
3.1 Prevention Technology for Illegal Access
3.2 Illegal Access Prevention Subsystem
3.3 Control Process Monitoring and Command Validation Block
4 Performance
4.1 Detecting Performance
4.2 Computing Performance
5 Conclusion
References
Proposing Theoretical Frameworks for Including Discreet Cues and Sleep Phases in Computational Intelligence
1 Introduction
2 Topic Proposal
2.1 Discreet Cues
2.2 Thesis
2.3 Thesis Elaboration
3 Method
3.1 Proposed Knowledge Base System for Knowledge Storage and Retrieval
3.2 Proposed Sleep Phase Mechanism for Knowledge Consolidation
4 Discussions
4.1 Inclusion of Discreet Cues
4.2 Inclusion of Sleep in a Distributed Learning Framework
5 Conclusion
References
DataWords: Getting Contrarian with Text, Structured Data and Explanations
1 Introduction
2 Conventional Wisdom: Structured Data is Easier to Model than Free Text
3 Conventional Approach: Directly Combining Free-Text and Structured Data Models
4 Modeling Structured Data by Treating it as Text
5 DataWords
6 Explanations
7 Processing Summary
8 Case Studies
8.1 Using Extraction
8.2 Using Structured Database Values
9 Discussion
10 Conclusions
References
Extractive Text Summarization for Turkish: Implementation of TF-IDF and PageRank Algorithms
1 Introduction
2 Text Summarization
2.1 Types of Text Summarization
3 Related Work
4 Design and Implementation
4.1 TF-IDF System
4.2 Hybrid System
4.3 Implementation
5 Evaluation
5.1 Experimental Setup
5.2 Results
5.3 Discussion
6 Conclusion
References
Recognition of Similar Habits Using Smartwatches and Supervised Learning
1 Introduction
2 Related Work
3 Sensors
3.1 Accelerometer
3.2 Attitude
3.3 Gravity
3.4 Gyroscope
4 Machine Learning Tool
5 Definition of Algorithms
6 Method
7 Results
8 Discussion of Results
9 Conclusion and Outlook
References
Brand Recommendations for Cold-Start Problems Using Brand Embeddings
1 Introduction
2 Related Work
3 Our Proposed Methodology
4 Data
5 Training Learning Models
6 Evaluation
7 Discussion and Conclusions
References
Commentary on Biological Assets Cataloging and AI in the Global South
1 Introduction
2 Challenges of AI in the Global South
3 Extrapolation to Biocybersecurity and Cyberbiosecurity
4 Academic Denial of Service Attacks
5 Implementation
6 Concluding Thoughts and Future Work: Synthesis Challenges of AI and BCS Combined
References
FI-SHAP: Explanation of Time Series Forecasting and Improvement of Feature Engineering Based on Boosting Algorithm
1 Introduction
2 Background
3 Feature Engineering Based on XAI Method
3.1 Construction of Lag Features
3.2 XAI Methods
4 Hybrid Explanation Method: FI-SHAP
4.1 Description
4.2 Improvement of Forecasting Performance
4.3 Evaluation Framework
5 Simulation Results
5.1 Description of Data Sets
5.2 Forecasting Results
5.3 Explanation Results
5.4 Improvement Results
6 Conclusion
References
Deep Learning and Support Vector Machine Algorithms Applied for Fault Detection in Electrical Power Transmission Network
1 Introduction
2 System Modeling
3 Machine Learning Approaches Synthesis
3.1 Deep Learning Approach
3.2 SVM Approach
4 Results and Discussion
5 Conclusion
References
Perception of the Situation: Social Stress and Well-Being Indices
1 Introduction
1.1 Research Objective
1.2 Hypotheses
1.3 Method
1.4 Index Derivation Algorithm
1.5 Tools
1.6 Data
2 Results and Discussion
2.1 General Description
2.2 Comparative Analysis
2.3 Index Derivation
3 Conclusion
References
Smart Hardware Trojan Detection System
1 Introduction
2 Related Work
2.1 Hardware Trojan Detection Mechanism
2.2 Data Fusion Techniques
3 Methodology
3.1 Testbed Setup
4 Elementary Results and Evaluation
4.1 Dataset
4.2 Experimental Results
5 Conclusion
References
A Study of Extracting Causal Relationships from Text
1 Introduction
2 Related Work
3 Unsupervised Approaches
3.1 Approach I: Using Pre-trained Models for Inference
3.2 Approach II: Reinforcement Learning-Based Approach
3.3 RL Task Description
4 Supervised Approaches
4.1 Annotated Dataset
4.2 Approach III: Using Siamese Model for Supervised Prediction
4.3 Approach IV: Using Sentence-Entity Pair for Supervised Prediction
5 Evaluation
5.1 Evaluation Plan and Strategy
5.2 Results
5.3 Supervised Methods: Approach III and IV
6 Conclusion
References
Blending Case-Based Reasoning with Ontologies for Adapting Diet Menus and Physical Activities
1 Introduction
2 Related Work
3 Ontologies and SWRL
4 Case Adaptation
4.1 Physical Activities and Restrictions
4.2 Similarity of Physical Activity with User Preferences and Best Case
4.3 Caloric Needs and Restricted Menus
4.4 Similarity of the Menus with the Reference Values
4.5 Similarity of the Menus with User Preferences
5 Implementation and Results
6 Conclusions and Future Work
References
Author Index


📜 SIMILAR VOLUMES


Intelligent Systems and Applications: Pr
✍ Kohei Arai (editor) 📂 Library 📅 2022 🏛 Springer 🌐 English

<p><span>This book is a remarkable collection of chapters covering a wide domain of topics related to artificial intelligence and its applications to the real world. The conference attracted a total of 494 submissions from many academic pioneering researchers, scientists, industrial engineers, and s

Intelligent Systems and Applications: Pr
✍ Kohei Arai (editor) 📂 Library 📅 2022 🏛 Springer 🌐 English

<p><span>This book is a remarkable collection of chapters covering a wide domain of topics related to artificial intelligence and its applications to the real world. The conference attracted a total of 494 submissions from many academic pioneering researchers, scientists, industrial engineers, and s

Intelligent Systems and Applications: Pr
✍ Kohei Arai (editor) 📂 Library 📅 2024 🏛 Springer 🌐 English

<p><span>The book is a unique collection of studies involving intelligent systems and applications of artificial intelligence in the real world to provide solutions to most vexing problems. IntelliSys received an overwhelming 605 papers which were put under strict double-blind peer-review for their

Intelligent Systems and Applications: Pr
✍ Kohei Arai (editor) 📂 Library 📅 2021 🏛 Springer 🌐 English

<p><span>This book presents Proceedings of the 2021 Intelligent Systems Conference which is a remarkable collection of chapters covering a wider range of topics in areas of intelligent systems and artificial intelligence and their applications to the real world. The conference attracted a total of 4

Intelligent Systems and Applications: Pr
✍ Kohei Arai (editor) 📂 Library 📅 2021 🏛 Springer Nature Switzerland AG 🌐 English

<p>This book presents Proceedings of the 2021 Intelligent Systems Conference which is a remarkable collection of chapters covering a wider range of topics in areas of intelligent systems and artificial intelligence and their applications to the real world. The conference attracted a total of 496 sub

Intelligent Systems and Applications: Pr
✍ Kohei Arai (editor) 📂 Library 📅 2021 🏛 Springer 🌐 English

<p><span>This book presents Proceedings of the 2021 Intelligent Systems Conference which is a remarkable collection of chapters covering a wider range of topics in areas of intelligent systems and artificial intelligence and their applications to the real world. The conference attracted a total of 4