𝔖 Scriptorium
✦   LIBER   ✦

📁

Intelligent Systems and Applications: Proceedings of the 2022 Intelligent Systems Conference (IntelliSys) Volume 1 (Lecture Notes in Networks and Systems, 542)

✍ Scribed by Kohei Arai (editor)


Publisher
Springer
Year
2022
Tongue
English
Leaves
832
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This book is a remarkable collection of chapters covering a wide domain of topics related to artificial intelligence and its applications to the real world. The conference attracted a total of 494 submissions from many academic pioneering researchers, scientists, industrial engineers, and students from all around the world. These submissions underwent a double-blind peer-reviewed process. Of the total submissions, 176 submissions have been selected to be included in these proceedings.

It is difficult to imagine how artificial intelligence has become an inseparable part of our life. From mobile phones, smart watches, washing machines to smart homes, smart cars, and smart industries, artificial intelligence has helped to revolutionize the whole globe. As we witness exponential growth of computational intelligence in several directions and use of intelligent systems in everyday applications, this book is an ideal resource for reporting latest innovations and future of AI. Distinguished researchers have made valuable studies to understand the various bottlenecks existing in different arenas and how they can be overcome with the use of intelligent systems. This book also provides new directions and dimensions of future research work.

We hope that readers find the volume interesting and valuable.

✦ Table of Contents


Editor’s Preface
Contents
Anomaly-Based Risk Detection Using Digital News Articles
1 Introduction
2 Background
2.1 Elliptic Envelope
2.2 Local Outlier Factor
2.3 Isolation Forest
2.4 Seasonal and Trend Decomposition Using Loess
2.5 Natural Language Processing
3 Approach
3.1 Data and Preprocessing
3.2 Anomaly Detection
3.3 News-Cluster Risk Analysis
3.4 Matching Anomalies and News-Cluster Risks
4 Evaluation
5 Results
6 Related Work
7 Conclusion
References
Robust Rule Based Neural Network Using Arithmetic Fuzzy Inference System
1 Introduction
2 Distending Function and Weighted Dombi Operator
3 Proposed Network Structure
3.1 Feed-Forward Calculations
3.2 Feedback Calculations
4 Training
5 Simulation Results and Discussion
5.1 Selling Price Prediction of Used Cars
5.2 IRIS Flower Species Classification
5.3 Wine Quality Dataset
6 Conclusion
References
A Hierarchical Approach for Spanish Sign Language Recognition: From Weak Classification to Robust Recognition System
1 Introduction
2 Related Work
3 Proposed Approach
3.1 Data Collection
3.2 Followed Pipeline
4 Experimental Results
5 Discussion
6 Conclusion and Future Work
References
Deontic Sentence Classification Using Tree Kernel Classifiers
1 Introduction
2 Methodology
2.1 Akoma Ntoso
2.2 LegalRuleML
2.3 Tree Kernels and Tree Representation
3 Related Works
4 Data
5 Experiment Settings and Results
6 Conclusions
References
Sparse Distributed Memory for Sparse Distributed Data
1 Purpose
2 Background
3 Model
4 Results
5 Conclusions
References
Quantum Displacements Dictated by Machine Learning Principles: Towards Optimization of Quantum Paths
1 Introduction
2 The Quantum Mechanics Machinery
2.1 Discrete Case
2.2 Continuous Case
2.3 Applications
2.4 Extraction of Propagator
2.5 Choice of Hamiltonian
2.6 Iterations Involving Propagators
2.7 Errors at the Energy Measurement
3 The Quantum Mechanics Machinery
4 Applications
4.1 Numerical Applications
5 Conclusion
References
A Semi-supervised Vulnerability Management System
1 Introduction
2 Related Work
3 Contributions of This Work
4 Problem Formulation
5 Algorithm
6 Experiments and Results
6.1 Database
6.2 Experiments
6.3 Preprocessing
6.4 Results
7 Analysis of Results
7.1 Improvement in Results
7.2 Word2Vec Embedding Space
8 Implementation Details
9 Model Deployment
9.1 Architecture
10 Conclusion
References
Evaluation of Deep Learning Techniques in Human Activity Recognition
1 Introduction
1.1 Motivation
1.2 Objectives
2 Background
2.1 Deep Learning
2.2 Deep Learning Architectures
2.3 Internet of Things
3 Methods
3.1 Deep Learning Models
3.2 Dataset
4 Results and Discussion
5 Conclusions
References
Siamese Neural Network for Labeling Severity of Ulcerative Colitis Video Colonoscopy: A Thick Data Approach
1 Introduction
2 The UC Video Scoring Method
3 Discussion and Conclusions
References
Self-supervised Contrastive Learning for Predicting Game Strategies
1 Introduction
2 Related Works
2.1 Convolutional Neural Networks
2.2 Self-supervised Contrastive Learning
3 Proposed Framework
3.1 Dataset
3.2 Modified Momentum Contrast
4 Experiments
4.1 Training
4.2 Evaluation
5 Conclusions
References
Stochastic Feed-forward Attention Mechanism for Reliable Defect Classification and Interpretation
1 Introduction
2 Related Works
3 Proposed Method
3.1 Feature Extraction
3.2 Feed-Forward Attention
3.3 Uncertainty Quantification
4 Experiments
4.1 Display Manufacturing Facility Datasets
4.2 Results
5 Conclusions
References
Bregman Divergencies, Triangle Inequality, and Maximum Likelihood Estimates for Normal Mixtures
1 Introduction
2 Bregman Divergencies
3 Normal Mixtures
4 Reproducing Kernel Hilbert Space, Clustering, and Normal Mixtures
4.1 RKHS
4.2 Clustering
4.3 Clustering and Maximum Likelihood Estimates for Normal Mixtures
5 Conclusion
References
Self-supervised Learning for Predicting Invisible Enemy Information in StarCraft II
1 Introduction
2 Related Works
3 Proposed Method
4 Experiments
4.1 Data and Experiments Setting
4.2 Results
5 Conclusions and Future Works
References
Measuring Robot System Agility: Ontology, System Theoretical Formulation and Benchmarking
1 Introduction
2 Related Work
2.1 Ontology of Robotic Systems and Components
2.2 Robot Autonomy
2.3 Standard for Measuring Robot Agility
3 Mathematical Framework for Measuring Agility
3.1 Systems Theoretical Approach
3.2 System Model
3.3 Formal Robot System Agility Definition
3.4 Time and Cost Constraints
3.5 Adaptability, Reactivity and Cost-Efficiency
4 Agility Evaluation
4.1 Exact Agility
4.2 Estimated Agility
4.3 Utility of Agility
4.4 Cost of Agility
5 Benchmarking
5.1 Different Types of Challenges
5.2 Adapting to Challenges
5.3 Benchmarking Procedures
6 Example Use Case: Robotic Arm Pick Operation
6.1 Robotic System
6.2 Challenges and Performance
6.3 Agility Evaluation
7 Discussion on Further Directions
References
A New Adoption of Cloud Computing Model for Saudi Arabian SMEs (ACCM-SME)
1 Introduction
2 Literature Review
3 Adoption Theories and Frameworks
4 Conceptual Framework
4.1 The Technological Context
4.2 The Organisational Context
4.3 The Environmental Context
4.4 The Social Context
5 Conclusion and Future Work
References
A New Approach for Optimal Selection of Features for Classification Based on Rough Sets, Evolution and Neural Networks
1 Introduction
2 Materials and Methods
2.1 Rough Set Theory
2.2 Neural Networks
2.3 Evolutionary Strategy
2.4 MNIST Data Set
2.5 Proposed Method
2.6 Experimental Setup
3 Results and Discussion
3.1 Performance Evaluation
3.2 State of the Art-Based Comparison
4 Conclusions and Future Work
References
An Unexpected Connection from Our Personalized Medicine Approach to Bipolar Depression Forecasting
1 Introduction
2 Methods
3 Results
4 Discussion
References
Real-Time Parallel Processing of Vibration Signals Using FPGA Technology
1 Introduction
2 The Architecture of the Acquisition System
2.1 Case 1: FFT Processing at the FPGA Circuit
2.2 Case 2: FFT Processing at the Microprocessor Level RT
2.3 Case 3: Processing at the PC Level
3 Software Development of Processing Application
3.1 Case 1: FFT Processing at FPGA Level
3.2 Case 2: FFT Processing at the Microprocessor Level RT
3.3 Case 3: FFT Processing at the PC Level
4 Experimental Results
4.1 Time Performance
4.2 Spectra View Obtained in Various Engine Scenarios
5 Future Work
6 Conclusions
References
Robust Control Design Solution for a Permanent Magnet Synchronous Generator of a Wind Turbine Model
1 Introduction
1.1 Related Literature Review
2 Wind Turbine Model
3 Control Scheme Implementation
4 Perturb and Observe Algorithm
5 Simulation Results
6 Conclusion
References
Knowledge Translator for Clinical Decision Support in Treating Hearing Disorders
1 Introduction
1.1 Tinnitus - A Medical “Enigma”
1.2 Tinnitus Retraining Therapy (TRT)
1.3 Clinical Decision Support System eTRT
1.4 eTRT Knowledge Base
2 Methods
2.1 Association Rules
2.2 Action Rules
2.3 Knowledge Translating Procedure
3 Experiments and Results
3.1 Graphical User Interface
3.2 Results
3.3 Discussion
4 Conclusions
References
Framework for Modelling of Learning, Acting and Interacting in Systems
1 Introduction
2 Definitions and Notations
3 Acting and Learning
3.1 Motivation
3.2 Stochastic Approach
3.3 Reductions to Games
4 Algorithms and Architectures
4.1 -greedy Algorithm
4.2 UCB Algorithm
4.3 Fictitious Play
4.4 From Classifier to Player
4.5 Neural Network
5 Further Work
References
How to Reduce Emissions in Maritime Ports? An Overview of Cargo Handling Innovations and Port Services
1 Introduction
2 Background
3 Methodology
3.1 Scope
3.2 Focus
3.3 Sources
4 Overview of Means to Facilitate Energy Transition in Ports
4.1 Berth
4.2 Transport for Cargo Operations and Allocation
4.3 Storage Yard
4.4 Port Gates
4.5 Port Administrative
4.6 Summary
5 Discussion
5.1 The Concept of a New Port
5.2 Extension of Port Orientation
5.3 Energy Transition
5.4 Limitations
6 Conclusion
References
Bridging the Domain Gap for Stance Detection for the Zulu Language
1 Introduction
2 Related Work
2.1 Domain Generalization, Adaptation, Randomization
2.2 Stance Detection
2.3 Explicit and Implicit Transfer Learning for NLP
3 Architecture, Methodology and Dataset
3.1 Step 1: Build the Training Dataset
3.2 Step 2: Build the Training Pipeline
3.3 Dataset
3.4 Baselines
4 Evaluation and Results
4.1 Domain Randomization
4.2 Domain Adaptation
5 Conclusions
References
Arcface Based Open Set Recognition for Industrial Fault
1 Introduction
2 Related Work
3 Method
3.1 Proposed Fault Classification Approach
3.2 Proposed Open Set Recognition Method
3.3 Arcface Loss Function
4 Experiments
4.1 Data Description
4.2 Experimental Design
4.3 Comparison Method
4.4 Experimental Result
5 Conclusion
References
Sensitivity of Electrophysiological Patterns in Level-K States as Function of Individual Coordination Ability
1 Introduction
2 Materials and Methods
2.1 Individual Coordination Ability (iCA)
2.2 Experimental Design
3 Results and Discussion
3.1 EEG Preprocessing Scheme
3.2 Classifying EEG Segments into their Corresponding Level-K
3.3 EEG Patterns Sensitivity Analysis
4 Conclusions and Future Work
References
A Machine Learning Approach for Discovery of Counter-Air Defense Tactics for a Cruise Missile Swarm
1 Introduction
2 A Framework for Evaluating Mission Effectiveness
3 SAM Engagement Geometry
4 ML Swarm Agent Design
4.1 Observation Function
4.2 Action Function
4.3 Behavior Function
5 Training Methodology
6 Baseline Simulation Scenario
7 Analytic Prediction of Mission Effectiveness
8 Simulation Results
8.1 Non-reactive CM Attack
8.2 Non-reactive Reduced RCS CM Attack
8.3 Autonomous ML Agent-Controlled CM Attack
8.4 Autonomous ML Agent-Controlled Reduced RCS CM Attack
9 Results Summary
10 Conclusions
References
Tackling Marine Plastic Littering by Utilizing Internet of Things and Gamifying Citizen Engagement
1 Introduction
2 Proposal Objectives and Challenges
3 The Proposed Solution
4 Research Methodology
5 Added Value and Impact
6 Conclusion
References
HiSAT: Hierarchical Framework for Sentiment Analysis on Twitter Data
1 Introduction
2 Related Work
3 Proposed Solution: HiSAT
3.1 Data Preprocessing
3.2 Word Cloud Visualization
3.3 Feature Extraction
3.4 Model Training with Batch of Classifiers
4 Implementation and Evaluation of Classifiers
4.1 Evaluation Metrics
4.2 Logistic Regression Classifier
4.3 Random Forest Classifier
4.4 NaĂŻve Bayes Classifier
4.5 Comparison and Discussion
5 Conclusions and Future Work
References
Characterization of Postoperative Pain Through Electrocardiogram: A First Approach
1 Introduction, Motivation and Goals
2 Materials and Methods
2.1 Setup and Data Collection
2.2 ECG Processing
3 Results and Discussion
3.1 Results
3.2 Discussion
4 Conclusions and Future Work
References
Deep Learning Applied to Automatic Modulation Classification at 28 GHz
1 Introduction
2 System Model and Problem Description
2.1 RF Signal Description
2.2 Modulation Constellations
2.3 Statistical Features for the GRF
3 Classification Method
3.1 System Structure
3.2 Graphical Representation of Features (GRF)
3.3 Deep Learning Networks
4 Evaluated Performance
5 Conclusion
References
An Exploration of Students and Lecturers’ Insights of Online University Learning Implemented During the COVID‐19 Contagion
1 Introduction
2 Literature Review
3 Methodology
3.1 Data Collection and Analysis
3.2 Participants
4 Discussion of Results and Future Work
5 Conclusion
References
Combining Rule-Based System and Machine Learning to Classify Semi-natural Language Data
1 Introduction
2 Commands' Similarities
3 Related Work
4 Architecture
5 Data
5.1 Graphs
6 Combination of Rule-Based and ML Systems
7 Rule-Based System to Classify Commands
7.1 Set of Rules
7.2 Transforming Data to Binary Classes
8 Machine Learning Systems to Classify Commands
8.1 Document Classifier: Logistic Regression
8.2 Document Classifier: Using Transformers
8.3 Sentence-Pair Classifier: Using Transformers
9 Results
9.1 Flexibility of ML System
9.2 Testing on Unseen Data
10 Discussion
11 Conclusion
12 Future Work
References
ASDLAF: A Novel Autism Spectrum Disorder Learning Application Framework for Saudi Adults
1 Introduction
2 Related Work
3 ASDLAF Framework
3.1 Intermediate Factors
3.2 Technological Factors
3.3 Cultural Factors
3.4 Pedagogical Factors
4 Conclusion and Future Work
References
A Comprehensive eVTOL Performance Evaluation Framework in Urban Air Mobility
1 Introduction
2 Literature Review
3 Problem Statement
4 Proposed Framework
4.1 UTM Simulator
4.2 Dilation
4.3 Performance Evaluation
5 Results
6 Discussion
7 Conclusion
References
A New Arabic Online Consumer Reviews Model to Aid Purchasing Intention (AOCR-PI)
1 Introduction
2 Online Review Platforms
3 Theoretical Frameworks of OCRs Influence
3.1 Elaboration Likelihood Model
3.2 Hali’s Cultural Model
3.3 Hofstede’s Cultural Dimensions Framework
4 Conceptual Framework
5 Hypotheses Development
5.1 Review Depth and Purchase Intention
5.2 Review Valence and Purchase Intention
5.3 Review Readability and Purchase Intention
5.4 Review Images and Purchase Intention
5.5 Review Volume and Purchase Intention
5.6 Reviewer Identity Disclosure and Purchase Intention
5.7 Reviewer Reputation and Purchase Intention
5.8 Reviewer Experience and Purchase Intention
6 Conclusion and Future Work
References
Trustworthy Artificial Intelligence for Cyber Threat Analysis
1 Overview
1.1 Literature Review
1.2 Bias in Existing AI/ML Algorithms
2 Using Adversarial ML Model to Discover Bias
2.1 Notation of Bias and Mitigation
3 AI Bias and ML-Based Threat Analytics
4 Programming and Experiments
References
Entropy of Shannon from Geometrical Modeling of Covid-19 Infections Data: The Cases of USA and India
1 Introduction
2 Motivation of Geometry-Based Models
3 Trapezoid Model of Pandemic
4 Entropy of Shannon
5 Discussion of Results from Entropic Modeling
5.1 United States of America
5.2 India
6 Conclusion
References
Optimization of the BANK’s Branch Network Using Machine Learning Methods
1 Introduction
1.1 Overview of Related Works
1.2 Description of Task
2 Data
3 Machine Learning Model for Customer Flow
3.1 Algorithm Choice
3.2 Model Tuning
3.3 Model Results
4 Conclusion
References
An Adaptive Hybrid Active Learning Strategy with Free Ratings in Collaborative Filtering
1 Introduction
2 Related Work
3 Background
4 Our Proposed Method
4.1 Adaptive Hybridization of Personalized and Non-personalized AL Strategies
4.2 Rating Elicitation with Free Ratings
5 Experimental Setup
5.1 Dataset
5.2 Base Recommender System
5.3 Comparison Methods
5.4 Evaluation Measure
6 Results and Discussion
6.1 Personalized vs Non-personalized
6.2 Adaptive Hybrid Strategy
6.3 Free Ratings
7 Conclusion and Future Work
References
Service Response Time Estimation in Crowdsourced Processing Chain
1 Introduction
2 Related Work
3 Methodology
3.1 Map-Matching Service
3.2 Response Time Estimation
4 Experiment
4.1 Experimental Setup
4.2 Datasets
4.3 Preprocessing Data
4.4 Evaluation
4.5 Experimental Methodology
5 Results and Discussion
5.1 Data Distribution Fitting
5.2 Response Time Estimation per Data Point
5.3 Accuracy Assessment
6 Conclusions
References
How to Build an Optimal and Operational Knowledge Base to Predict Firefighters' Interventions
1 Introduction
2 Related Work
3 Database Design
3.1 The Targets
3.2 The Features
4 Experimental Results
4.1 Experimental Protocol
4.2 Obtained Results
5 Conclusion
References
Explainable Black Box Models
1 The Quest for Explainability in Artificial Intelligence Models
1.1 Introduction
1.2 Purpose of the Paper
2 Are Inherently Explainable Models Needed?
2.1 Black Box Models Versus Explainable Models
2.2 Explanations that Are Not Inherent in the Model Are Not Faithful to What the Original Model Computes
2.3 Completing Explanations
3 Explainable Black Box Models
3.1 Explanations as Output of a Black Box Model
3.2 Variance of Outcomes of Explainable Black Box Models
4 The Use of Explainable Black Box Models
4.1 Explainable Black Box Models Are More Application-Oriented Than Explainable Models
4.2 Rigorous Analysis of Explanations
4.3 Simulations
5 Conclusion
References
Vehicle Usage Extraction Using Unsupervised Ensemble Approach
1 Introduction
2 Related Work
3 Data Representation
4 Problem Formulation
5 Proposed Methodology
5.1 Data Integration
5.2 Data Segmentation
5.3 Ensemble Clustering
5.4 Pattern Extraction
6 Results
6.1 Ensemble Clustering Evaluation
6.2 Cluster Analysis
6.3 Utility Function
6.4 Vehicle Usage Style
7 Discussion and Conclusion
References
Experimental Design of a Quantum Convolutional Neural Network Solution for Traffic Sign Recognition
1 Introduction
2 Designing a Solution
2.1 Quantum Limitations and Dataset Reduction
2.2 Transforming Data into Qubits
2.3 Applying Convolutional and Pooling Layers
2.4 Quantum Principle Component Analysis
3 Testing and Evaluation
3.1 Program Optimization
3.2 Program Results with Optimised Parameters
4 Conclusions and Future Work
References
Impact of Image Sensor Output Data on Power Consumption of the Image Processing System
1 Introduction
2 Related Work
3 Methodology
3.1 Power Measurement Setup of the MIPI Communication
3.2 Energy Measurement Setup of the System
4 MIPI Power Measurement Results
5 System Measurement Results
6 Conclusion and Future Work
References
IAI-CGM: A Framework for Intention to Adopt IoT-Enabled Continuous Glucose Monitors
1 Introduction
2 Related Work
2.1 Diabetes Testing
2.2 Diabetes Monitoring
2.3 Role of CGM in T1DM Primary Care
2.4 IoT-CGM Adoption Concerns
3 Proposed Adoption Framework: IAI-CGM
3.1 Human Factors
3.2 Interpersonal Influence
3.3 Innovativeness
3.4 Trustworthiness
3.5 Self-efficacy
3.6 Attitude Towards Wearable Devices
3.7 Health Interest
3.8 Perceived Value
3.9 IAI-CGM Dimensions
4 Research Hypothesis
5 Conclusion and Future Work
References
Artificial Vision Algorithm for Behavior Recognition in Children with ADHD in a Smart Home Environment
1 Introduction
2 Related Work
3 Methodology
3.1 Hardware Customizability
3.2 Classification Algorithm
3.3 Experiment
4 Discussion of the Results
5 Conclusions
References
Spread of Fake News About Covid: The Ecuadorian Case
1 Introduction
2 Methodology Followed for This Case Study
3 Results Obtained
4 Discussion/Opinions
5 Conclusion
References
Data Augmentation Methods for Electric Automobile Noise Design from Multi-Channel Steering Accelerometer Signals
1 Introduction
2 Proposed Method
3 Experiments
3.1 Data Collection and Experimental Setting
3.2 Results
4 Conclusions and Future Works
References
Real-Time Student Attendance System Using Face Recognition
1 Introduction
2 Proposed System
3 Conclusions
References
The Unfortunate Footnote: Using the Affective Reasoner to Generate Fortunes-of-Others Emotions in Story-Morphs
1 Introduction and Motivation
2 Background Theory
3 How Story Morphing Works
3.1 The Formal Discrete-Sequenced Plot Derived from an Original Text Narrative
3.2 Goals
3.3 Goals that Q Believes that R has (Goals of Others)
3.4 Goals that Q Believes that R Believes that S has (Goals of Others of Others)/Relationship that Q Believes R has Toward S
3.5 Standards/Principles
3.6 Standards that Q Believes that R has (Standards of Others)
3.7 Standards that Q Believes that R Believes that S has (Standards of Others of Others)/Relationship that Q Believes R has Toward S
3.8 Preferences
3.9 Friendship, Animosity and Cognitive Unit Relationships
3.10 Personalities
3.11 Story-Morphs
4 Implementation
5 Conclusions and Summary
References
Application of the Solution for Analysis of IT Systems Users Experience on the Example of Internet Bank Usage
1 Introduction
2 Background and Related Work
2.1 The Scope of UX Analysis
2.2 Trends in UX Analysis
3 Approach Used to Obtain and Visualise UX Characteristics from Audit Log Data
4 User Study
4.1 The Most/Least Popular or Achieved vs. Unachieved Goals
4.2 Analysis of User Journeys
4.3 Analysis of Individual Actions of User Journeys
5 Conclusions and Future Research
References
Real-World Computer Vision for Real-World Applications: Challenges and Directions
1 Introduction
2 Challenges of Real-World Computer Vision
2.1 Privacy-Awareness
2.2 Latency Constraints and Online Execution
2.3 Visual Robustness and Resiliency
2.4 Scalability and Generalization
3 Background and Related Work
3.1 End-to-End Computer Vision
3.2 Robustness Against Noisy Data
3.3 Domain Adaptation and Generalization
4 Proposed Algorithmic Shifts for Real-World Computer Vision
4.1 Privacy-Aware Identity-Neutral Vision Pipeline
4.2 Semantic Feedback with Spatial/Temporal Graph to Enable End-to-End Robustness
5 Early Results and Evaluation
5.1 Case Study: Smart Health Monitoring System
5.2 Experimental Setup
5.3 System Validation
5.4 Person Trajectory Prediction
5.5 Action Detection
5.6 Health Monitoring
6 Conclusions
References
Proactive Chatbot Framework Based on the PS2CLH Model: An AI-Deep Learning Chatbot Assistant for Students
1 Introduction
2 Literature Review
3 The Proposed Proactive Chatbot Framework for Students Based on PS2CLH’s Model
3.1 Wide-ranging Extended Chatbot
3.2 Educational Chatbot Ecosystem
4 Test the Proactive Chatbot Framework and Extending BERT Chatbot, Results
5 Conclusion and Future Works
References
MR-VDENCLUE: Varying Density Clustering Using MapReduce
1 Introduction
2 Challenges Of Implementing a Distributed VDENCLUE Algorithm
3 MR-VDENCLUE Algorithm
3.1 Step 1: LSH Partitioning
3.2 Step 2: Local Clustering
3.3 Step 3: Attractors Partitioning
3.4 Step 4: Merging
3.5 Step 5: Relabelling
4 Implementation Using MapReduce
5 Experimental Evaluation
5.1 Selection of k Parameter
5.2 Computational Cost
6 Conclusion
References
A Case for Modern Build Automation for Intelligent Systems
1 Introduction
2 Comparison: Our Approach
2.1 Reducing the Subjects for Comparison
2.2 Analysis of the Research Subjects
2.3 Development of Comparison Criteria
2.4 Development of a Reference Scenario
2.5 Concluding Comparison of the Analyzed Subjects
3 CI/CD Tool Evaluation: GitLab
3.1 Internals
3.2 Pipelines
3.3 Additional Features
3.4 Platforms
4 Evaluation Summary
5 Conclusion
References
The Self-discipline Learning Model with Imported Backpropagation Algorithm
1 Introduction
2 Basic Theories
2.1 Probability Scale Self-organization
2.2 Probability Space Distance
2.3 CNN Backpropagation
3 Model Based on the Combination of CNN and SDL
4 Data and Preprocessing
5 Analysis and Results
6 Conclusion
References
Author Index


📜 SIMILAR VOLUMES


Intelligent Systems and Applications: Pr
✍ Kohei Arai (editor) 📂 Library 📅 2022 🏛 Springer 🌐 English

<p><span>This book is a remarkable collection of chapters covering a wide domain of topics related to artificial intelligence and its applications to the real world. The conference attracted a total of 494 submissions from many academic pioneering researchers, scientists, industrial engineers, and s

Intelligent Systems and Applications: Pr
✍ Kohei Arai (editor) 📂 Library 📅 2022 🏛 Springer 🌐 English

<p><span>This book is a remarkable collection of chapters covering a wide domain of topics related to artificial intelligence and its applications to the real world. The conference attracted a total of 494 submissions from many academic pioneering researchers, scientists, industrial engineers, and s

Intelligent Systems and Applications: Pr
✍ Kohei Arai (editor) 📂 Library 📅 2021 🏛 Springer Nature Switzerland AG 🌐 English

<p>This book presents Proceedings of the 2021 Intelligent Systems Conference which is a remarkable collection of chapters covering a wider range of topics in areas of intelligent systems and artificial intelligence and their applications to the real world. The conference attracted a total of 496 sub

Intelligent Systems and Applications: Pr
✍ Kohei Arai (editor) 📂 Library 📅 2021 🏛 Springer 🌐 English

<p><span>This book presents Proceedings of the 2021 Intelligent Systems Conference which is a remarkable collection of chapters covering a wider range of topics in areas of intelligent systems and artificial intelligence and their applications to the real world. The conference attracted a total of 4

Intelligent Systems and Applications: Pr
✍ Kohei Arai (editor) 📂 Library 📅 2024 🏛 Springer 🌐 English

<p><span>The book is a unique collection of studies involving intelligent systems and applications of artificial intelligence in the real world to provide solutions to most vexing problems. IntelliSys received an overwhelming 605 papers which were put under strict double-blind peer-review for their

Intelligent Systems and Applications: Pr
✍ Kohei Arai (editor) 📂 Library 📅 2021 🏛 Springer 🌐 English

<p><span>This book presents Proceedings of the 2021 Intelligent Systems Conference which is a remarkable collection of chapters covering a wider range of topics in areas of intelligent systems and artificial intelligence and their applications to the real world. The conference attracted a total of 4