توضیحاتی در مورد کتاب Intelligent Computing: Proceedings of the 2021 Computing Conference, Volume 1 (Lecture Notes in Networks and Systems, 283)
نام کتاب : Intelligent Computing: Proceedings of the 2021 Computing Conference, Volume 1 (Lecture Notes in Networks and Systems, 283)
ویرایش : 1st ed. 2022
عنوان ترجمه شده به فارسی : محاسبات هوشمند: مجموعه مقالات کنفرانس محاسباتی 2021، جلد 1 (یادداشت های سخنرانی در شبکه ها و سیستم ها، 283)
سری :
نویسندگان : Kohei Arai (editor)
ناشر : Springer
سال نشر : 2021
تعداد صفحات : 1183
ISBN (شابک) : 3030801187 , 9783030801182
زبان کتاب : English
فرمت کتاب : pdf
حجم کتاب : 26 مگابایت
بعد از تکمیل فرایند پرداخت لینک دانلود کتاب ارائه خواهد شد. درصورت ثبت نام و ورود به حساب کاربری خود قادر خواهید بود لیست کتاب های خریداری شده را مشاهده فرمایید.
فهرست مطالب :
Editor’s Preface
Contents
Analytical View on Non-invasive Measurement of Moving Charge by Various Topologies of Wannier Qubit
1 Motivation for Weak Measurement of Moving Charged Particles
2 Single Electron Devices as Detectors of Moving Charged Particles
3 Dynamic of Two Qubit Electrostatic Entanglement Under Influence of Weak Measurement
4 Concept of Position Dependent Electrostatic Roton Qubit
4.1 Case of Symmetric Semiconductor Roton
4.2 Case of Asymmetric Semiconductor Quantum Roton
4.3 Action of Phase Rotating Gate Described Analytically
5 Analogy Between Single-Electron Charged Based in 2 Coupled Quantum Dots Qubit and 1/2 Spin Qubit
6 Particle in Rotating Magnetic Field and Relation to the Charge Qubit
7 Spin 1/2 Dynamics of Single Electron in Magnetic Field in Angle Coordinates and Its Mapping to Single-Electron Charge Qubit Dynamics in System of 2 Coupled Quantum Dots
8 Conclusions
References
Multi-population Genetic Algorithm with the Actor Model Approach to Determine Optimal Braking Torques of the Articulated Vehicle
1 Introduction
2 Mathematical Formulation of the Model of Investigation
3 Definition of Optimization Problem
4 Genetic Algorithm with Actor Model Approach
5 Numerical Simulations
6 Conclusions
References
A Novel Three-Way Merge Algorithm for HTML/XML Documents Using a Hidden Markov Model
1 Introduction
2 Hidden Markov Models (HMMs)
3 The ``Three-Way Merge\'\' Approach as a Hidden Markov Model (HMM)
4 Implementation and Experimental Results
5 Conclusion
References
Scaling Out Transformer Models for Retrosynthesis on Supercomputers
1 Introduction
2 Previous Work
2.1 Computer Aided Retrosynthesis
2.2 Distributed Training
3 Approach
3.1 Dataset
3.2 Transformer Model
3.3 Distributed Training
3.4 System Specifications
4 Experiments
5 Results
5.1 Accuracy on Test Set
5.2 Scaling Performance
6 Discussion
7 Conclusion
References
Naming Processes in Multichannels with Beeps in the Weak Model
1 Introduction
2 Related Work
3 Technical Preliminaries
4 Naming in the Known Number of Processes Model
4.1 Proof of Correctness and Analysis
5 Naming in the Unknown Number of Processes Model
5.1 Proof of Correctness and Analysis
6 Conclusions
References
Distributed Evolution of Deep Autoencoders
1 Introduction
2 Related Work
3 Autoencoders
3.1 Image Denoising
3.2 Manifold Learning
4 Evolving Deep Autoencoders
4.1 Network Construction
4.2 Network Evolution
4.3 System Architecture
5 Experiments
6 Discussion
7 Conclusion
References
Computational Power of a Hybrid Algorithm for Solving the Multiple Knapsack Problem with Setup
1 Introduction
2 Related Works
3 Hybrid Methods for PMKPS
3.1 The Model
3.2 A Hybrid Method
3.3 Enhancing the Hybrid Method
4 Experimental Part
4.1 Effect of the Valid Constraints
4.2 Behavior of EHM Versus Other Available Methods
5 Conclusion
References
Accelerated Quantum Computation based on Quantum Coherent Dynamics of Evanescent Photons in Liquid Water
1 Introduction
2 A Brief Overview of QED Coherence in Liquid Water
3 Quantum Tunneling-Coupling Interaction Between Water Coherent Domains
3.1 “Supercoherence” and the Interaction Between Coherent Domains
3.2 Quantum Coupling Between Water CDs
4 Quantum (Hyper) Computation by Means of Water Coherent Domains
4.1 The Concept of “Universal” Quantum Computation
4.2 The Realization of Two-Qubits Gates by Means of Water Coherent Domains
4.3 The Realization of One-Qubit Gates by Means of Water Coherent Domains
5 A Novel Computer Architecture for Quantum Hypercomputation
6 Summary and Outlook
References
Computer Scientist’s and Programmer’s View on Quantum Algorithms: Mapping Functions’ APIs and Inputs to Oracles
1 Introduction
2 History and Related Work
2.1 Quantum Computing
2.2 Quantum Algorithms
2.3 Quantum Oracles
3 Problem Statement
4 Deutsch-Jozsa Algorithm
5 Grover’s Algorithm
6 Quantum Oracles
6.1 The Role of Quantum Oracles
6.2 Quantum Oracles as Input Representation
7 Case Studies
8 Conclusions and Final Thoughts
References
Orca: A Software Library for Parallel Computation of Symbolic Expressions via Remote Evaluation on MPI Systems
1 Introduction
2 Background and Motivation
2.1 What is Wrong with MPI?
2.2 Related Works
2.3 Symbolic Expression
3 Programming Model
3.1 Module Structure
3.2 Overview of APIs
3.3 Marshalling
4 Experiments and Discussion
4.1 A Case Study: Distributed Reduction Operation
4.2 Performance Evaluation
5 Conclusions and Future Work
References
Solving High-Dimensional Nonlinear Equations with Infinite Solutions by the SVM Visualization Method
1 Introduction
2 Methodology
3 Examples
4 Conclusion
References
A Novel GPU Implementation for Image Stripe Noise Removal
1 Introduction
2 Stripe Denoising Strategy and Algorithm
2.1 Parallel Implementation via GPU-CUDA
3 Results
3.1 Quality Measures
3.2 Performance Analysis
4 Conclusions
References
DevOps for Open Source Multimedia Frameworks
1 Introduction
2 DevOps Architecture in the Open Source
3 Methodology
3.1 Example of FFmpeg/GStreamer DevOps Deployment
3.2 VAAPI-Fits, Pre-checkin and Cartwheel
4 Conclusion
References
Designing a Cost-Efficient Network for a Small Enterprise
1 Introduction
2 Related Works
2.1 Reduce the Cost of Labour
2.2 Adjusting the Network Layers
2.3 Use Wireless More
2.4 Cheaper and Scalable Hardware
2.5 Cheaper and Scalable Hardware
3 Problem Statement
3.1 Building Layout
3.2 Services
3.3 Functional and Non-functional Requirements
4 Proposed Approach
4.1 Topology
4.2 Wireless
4.3 Energy
5 Simulation Results
5.1 Simulations and Ping Result of BTC Old Network
5.2 Simulations and Ping Result of BTC New Network
6 Evaluation
6.1 Throughput
6.2 Energy Consumption
6.3 Cleaner Environment
6.4 Topology Adjustment
6.5 Running Cost/Saving
7 Discussion
8 Conclusion
References
Staff Rostering Optimization: Ideal Recommendations vs. Real-World Computing Challenges
1 Staff Rostering
2 Ideal Recommendations
3 Computational Intelligence Framework
4 Recommendations vs. Practice
5 Academic and Practical Findings
6 Conclusions and Future Work
References
Resolution of the Frobenius Problem with an Adiabatic Quantum Computer
1 Numerical Semigroups and the Frobenius Problem
2 The Ising Spin Problem in Adiabatic Quantum Computing
3 Resolution of the Frobenius Problem with an Adiabatic Quantum Computer
4 A Word on Conclusions
References
The Design of Customizable Distributed Algorithms for InDiGO Framework
1 Introduction
2 Problem Motivation and Related Work
2.1 Problem Motivation
2.2 Related Work
3 Development of Customizable Algorithms
3.1 Interaction Sets
3.2 Membership Criteria for Interaction Sets
3.3 Rules for Dynamic Updates to the Interaction Sets
4 Mutual Exclusion Algorithm Example
4.1 The Mutual Exclusion Problem
4.2 Description of Lamport\'s Mutual Exclusion Algorithm
4.3 Customized Version
5 Conclusion and Future Work
5.1 Conclusion
5.2 Future Work
References
Computational Optimization of Voids on 3D Woven Composites Truss Structures During Infusion
1 Introduction
2 Isotropic Flow Simulations
3 Results and Discussion
4 Results and Discussion
5 Results
6 Discussion
7 Conclusions
References
Towards AGI: Cognitive Architecture Based on Hybrid and Bionic Principles
1 Introduction
2 Principles of the Hybrid Paradigm of Artificial Intelligence
3 Bionic Principles Suitable for Cognitive Architecture
4 The Architecture of Artificial Intelligent Agent
5 Conclusion
References
An Array Abstraction to Amortize Reasoning About Parallel Client Code
1 Introduction
1.1 Clean Semantics and Shared Data in the Presence of Parallelism
1.2 The Interference Contract and Partitions
2 A Motivating Example
2.1 Verification Challenges with This Approach
3 The Splittable_Array Abstraction
3.1 Divide-and-Conquer Client Code Using SplittableArray
3.2 Reusability and Modifiability
3.3 Efficiently Realizing SplittableArray
4 A Hierarchy of Array Abstractions
4.1 Three Distinct Array Abstractions
4.2 Layered Implementations
5 Related Work
6 Conclusions
References
Parallel Accurate and Reproducible Summation
1 Introduction
2 Notations and Background
2.1 Floating-Point Arithmetic
2.2 Related Work
2.3 Demmel and Hida Algorithms
3 Accurate Summation
3.1 Accurate Summation in Sequential
3.2 Accurate Summation in Parallel
4 Numerical Experiments
4.1 Numerical Accuracy of the Algorithms
4.2 Reproducibility
4.3 Our Sequential Algorithm Vs Demmel and Hida Algorithm
5 Conclusion
References
Cell Assembly-based Task Analysis (CAbTA)
1 Introduction
1.1 Cell Assemblies and Brains
1.2 Task Analysis and Symbolic Artificial Intelligence
1.3 Cell Assembly-based Task Analysis
2 The Cell Assembly-based Task Analysis Models
2.1 The Simplified Cell Assembly Model (SCAM)
2.2 The Cell Assembly Architecture Relationship (CAAR) Diagram
2.3 The Main Analysis Document (MAD)
3 Method
3.1 The Task
3.2 Data Collection
3.3 CAbTA Method
4 Results
4.1 Time Results
4.2 SCAM Results
4.3 CAAR Results
5 Discussion
5.1 Cell Assembly-based Task Analysis
5.2 Artificial Intelligence, Neuroscience and Psychology
6 Conclusions
References
PDSA Computing
1 Changing World
2 Discover How It Behaves
2.1 Try Models One After Another
2.2 Sensing and Actuation
3 Human Movement
4 Euclidean Space and Non-euclidean Space
4.1 Mahalanobis Distance (MD)
4.2 Mahalanobis-Taguchi System (MTS)
5 Static to Dynamic
6 Perception Motivation Decision Making Action Emotion (PMDAE) Cycle
7 Performance Indicator
8 Mahalanobis Distance-Pattern (MDP) Approach
9 Natural Computing
9.1 Mind-Body-Brain
9.2 The Octopus
References
An Iterative Randomized Rounding Algorithm for the k-Clustering Minimum Completion Problem with an Application in Telecommunication Field
1 Introduction
2 Related Work
3 A Randomized Rounding Algorithm
3.1 A Basic Rounding Procedure
3.2 A Modified Rounding Strategy-Based Method
3.3 Local Constructive Search
3.4 An Iterative Randomized Rounding Algorithm
4 Computational Results
4.1 The First Phase of the Randomized Rounding Procedure
4.2 Effect of the Hill-Climbing Strategy
4.3 Behavior of IRRA Vs Other Methods
5 Conclusion
References
Non-dominated Ranking Biogeography Based Optimization Algorithm for Virtual Machine Placement in Cloud Computing
1 Introduction
2 Background
3 Problem Formulation
3.1 Power Consumption
3.2 Resource Wastage
4 The Non-dominated Ranking Biogeography Based-Optimization
4.1 Biogeography Based Optimization
4.2 The Adapted BBO for the VMP Problem: NRBBO
5 Tests and Results
5.1 Comparison of NRBBO with VMPACS and VMPMBBO
5.2 Comparison of NRBBO with NSGA II
6 Conclusion
References
Multi-core Aware Virtual Machine Placement for Cloud Data Centers with Constraint Programming
1 Introduction
1.1 Virtualization
1.2 Virtual Machine
1.3 Data Center
1.4 VM Placement
1.5 Motivation
1.6 Problem Statement
2 Related Work
3 Multi-core Aware VMP Model using Constraint Programming (MCA-VMP)
3.1 Resource Allocation Manager
3.2 MCA-VMP Problem Formulation
3.3 MCA-VMP with Constraint Programming
3.4 Performance Evaluation
3.5 MCA-VMP Algorithm
3.6 Simulation Setup
3.7 Simulation Results
3.8 Simulation Analysis
4 Conclusion and Future Work
References
Finding Critical Packet-Drop Levels of Streaming at Cloud Edge Networks and the Proposed Solution
1 Introduction
2 Testbed Network Architecture
2.1 Application Configuration
2.2 Profile Configuration
2.3 Background Traffic
3 Performance Results and Proposed Solution
3.1 Effect of Background Traffic
3.2 QoS Voice Versus Video Traffic
3.3 Dropped Traffic
3.4 Throughput
3.5 Network Utilization
4 Conclusion
References
Cyber Security in Cloud: Risk Assessment Models
1 Introduction
2 Review of the Literature of Cloud Risk Assessment Models
2.1 Models of the Literature
2.2 Conclusions of the Literature Review
2.3 Research Problem
3 Characteristics of the Theoretical Cloud Risk Assessment Reference Model
4 Classification of Cloud Risk Assessment Models
5 Related Work
6 Conclusions and Future Work
References
In-Place VM Migration for Fast Update of Hypervisor Stack
1 Introduction
2 Virtualization Appliance
3 VM In-Place Live Migration
4 Update Methods
4.1 Partial Update
4.2 Kexec Update
4.3 Reboot Through Firmware Update
5 Future Works
5.1 Pre-booted Update
5.2 Multi-OS Update
6 Conclusion
References
Robustness Comparison of Scheduling Algorithms in MapReduce Framework
1 Introduction and Related Work
2 System Model
3 Load Balancing Algorithms
3.1 Priority Algorithm
3.2 Balanced-PANDAS Algorithm
3.3 MaxWeight Based Algorithm
4 Robustness Comparison of Scheduling Algorithms
5 Conclusion and Future Work
References
Seamless Update of a Hypervisor Stack
1 Introduction
2 Background
2.1 Faster Reboot
2.2 Partial HV Stack Update
2.3 Seamless Upgrades
3 Upgrade Methods
3.1 HVPlexing
3.2 HVInception
3.3 HVPartitioning
4 Device Migration
5 Conclusion
References
Developing a Framework of Critical Factors Affecting the Adoption of Cloud Computing in Government Systems (ACCE-GOV)
1 Introduction
2 Theoretical Background
2.1 Overview of Cloud Computing
2.2 Adoption of the Cloud
3 Research Model and Hypotheses
3.1 Theoretical Models
4 Research Model
4.1 Technological Context
4.2 Organizational Context
4.3 Environmental Context
4.4 Social Context
5 Research Methodology
5.1 Measurement
5.2 Data
6 Results
6.1 Confirmatory Factor Analysis (CFA)
6.2 Validity and Reliability Assessment
7 Data Analysis
7.1 Structural Equation Model (SEM)
7.2 Descriptive Statistics
8 Discussion
8.1 Technology Dimension
8.2 Organizational Dimension
8.3 Environmental Dimension
8.4 Social Dimension
8.5 Implications for Practice
8.6 Implications for Theory
9 Research Limitations
10 Conclusions
References
Approximate Analysis of Deviant Behavior on Social Media
1 Introduction
2 State of the Art
3 Solution Methodology
4 Intelligent Technology Application
5 Implementation Results
6 Conclusion
References
Investigating the Characteristics of the Response Waiting Time in a Chat Room
1 Introduction
2 Related Work
3 Waiting Time: Analysis Methodology
3.1 What is the True Nature of RWT?
3.2 Comparing Results from the Fitted Power Law with Other Distributions
4 Factors Affecting RWT in Pair Conversation
4.1 The Impact of Number of Message Exchange on Response Waiting Time
4.2 Dynamism of a Single User\'s RWT with Other Users at Different Chat Sessions
4.3 Time of Day, Day of Week and RWT Interaction
4.4 Results Compared with Previous Models
5 Discussion
6 Conclusion
References
Some Socio-demographic Usage Patterns in Ephemeral Content Sharing Social Networks: The Case of Snapchat
1 Introduction
2 Related Work
3 Methodology
3.1 Procedure
3.2 Survey and Participants
4 Obtained Results
4.1 Age Groups
4.2 Level of Education
4.3 Gender
4.4 Marital Status
5 Discussion
6 Conclusion and Future Work
References
Automatic Extraction of Emojiset
1 Introduction
2 Related Work
3 Methodology of Extracting the Emojisets
4 Dataset
5 Emojiset Analysis
5.1 Control Emojisets
5.2 NBA Emojisets
5.3 Politics Emojisets
5.4 Epidemic Emojisets
5.5 Education Emojisets
5.6 Cars Emojisets
6 Analysis of Sequences of Emojisets
7 Conclusion and Future Work
Appendix
References
How Twitter Interactions Leak Political Trends
1 Introduction
2 Background of Twitter Political Tendency
3 Political Interaction Modeling
4 Political Interaction Analysis
4.1 User Interactions Dataset
4.2 Inspection Processes
5 Interaction Weights
5.1 Interaction Weight Algorithm (IWA)
5.2 IWA Evaluation
6 Users Interaction Analysis Strategy (UIAS)
6.1 ETL Engine
6.2 Data Warehouse
6.3 Tendency Processing
7 UIAS Evaluation
8 Conclusions
References
Public Reaction on Social Media During COVID-19: A Comparison Between Twitter and Weibo
1 Introduction
2 Background
2.1 Power of Social Media Analysis
2.2 Importance of Social Media After Crisis
2.3 COVID-19 Related Works
3 Method
3.1 Data Collection
3.2 Data Analysis
4 Results
4.1 Trends on Volume
4.2 Sentiment
4.3 Most Posted Topics
4.4 Top Mentions
4.5 Content of Posts
5 Discussion
6 Limitations
7 Conclusion
References
Word Frequency Analysis of Community Reaction to Religious Violence on Social Media
1 Introduction
2 Background
3 Method
4 Results
5 Conclusion
References
Humans Digital Avatar Reconstruction for Tactical Situations Animation
1 Introduction
2 Related Work
3 Formal Task Description
4 Method Description
4.1 Video Preprocessing
4.2 Extracting the Background Image
4.3 Human Poses Detection and Estimation
4.4 Calculation of the ``Color\'\' Parameter of Body Parts
4.5 Constructing the Graphical Representation of the Scene
5 Results
References
Action Recognition in Handball Scenes
1 Introduction
2 Experiment Workflow for Action Recognition in Handball
2.1 The Dataset
2.2 The Metrics
2.3 The Action Recognition Models
3 Experimental Results and Observations
3.1 Comparison of the Performances of Action Recognition Models
3.2 Analysis of Model Performance with Respect to the Frame Selection Strategy
4 Conclusion
References
Application of Robotics to Domestic and Environmental Cleanup Tasks
1 Introduction
2 Inside the Home: Case Study - Laundry
2.1 Clothes to the Washer
2.2 Clothes from the Washer
3 Inside the Home: Case Study – Cleaning Up Toys
4 Outside the Home: Case Study – Gutter Cleaning
5 In the Wider World: Case Study – Environmental Cleanup
6 Conclusions
References
RF Mapping for Sensor Nodes Connectivity and Communication Signal Recovery
1 Introduction
2 RF Mapping Versus Physical Mapping
2.1 Modeling of RF Mapping Recognition Method
2.2 RF Signal Strength Measurements
3 Physical Obstacles Experiments
3.1 Copper Wall Obstacle
3.2 Copper Cage Obstacle
4 Simulation and Physical Results Validation
4.1 Wall Results Validation
4.2 Cage Results Validation
5 Gradient Descent Method
6 Gradient Computation of the RF Signal
7 Gradient Descent Formulation
8 Various Gradient Scenarios
9 Gradient Algorithm Experimental Results
10 Conclusion
References
DBA-Filter: A Dynamic Background Activity Noise Filtering Algorithm for Event Cameras
1 Introduction
2 Dynamic Vision Sensors
2.1 Principle of Operation
3 Filtering
3.1 TS-Filter
3.2 BA-Filter
4 Results
4.1 Experimental Setup
4.2 Qualitative Evaluation
4.3 Quantitative Evaluation
5 Conclusion
References
Gamification in a Learning Resource for the Study of Human Computer Interaction
1 Introduction
1.1 HCI Pedagogic Challenges
1.2 HCI Educational Aspirations
2 Pedagogy for HCI
2.1 Blended Learning
2.2 Dialogic Feedback
2.3 Simulations
2.4 Gamification
2.5 Summary
3 Designing a Gamified Learning Experience
4 Methodology
5 Results
5.1 Attendance and Attainment
5.2 Student Interviews
6 Discussion
6.1 Blended Learning
6.2 HCI Requirements
6.3 Simulation and Dialogic Feedback
6.4 Gamified Features
7 Conclusions
Appendix 1
References
Machine Learning Control for Mobile Robot by Approximation Extremals by Symbolic Regression
1 Introduction
2 Statement of the Control System General Synthesis Problem
3 Solving the Optimal Control Problem
4 Variation Cartesian Genetic Programming
5 Computation Experiment
References
Towards Synchronous Model of Non-emotional Conversational Gesture Generation in Humanoids
1 Introduction
2 Background
2.1 Fuzzy Semantic Algebra for Gestures
2.2 Synchronized Motions in Gestures
2.3 Modeling Head-Based Conversational Gestures
2.4 Haptics
2.5 Conceptual Graphs and Dependencies
3 Related Works
3.1 Cognitive Hand-Gesture Classification
3.2 Recognizing Simple Hand-Gestures
3.3 Gesture Generation in Humanoids
4 An Extended Gesture Classification
4.1 Integrated Gestures
5 Linguistic Gestures Modeling
6 Future Work
References
MQTT Based Appliance Control and Automation with Room Occupancy Monitoring Using YOLO
1 Introduction
2 Methodology
2.1 Hardware Components and Software Protocols
2.2 Room Occupancy Accounting Using Video Processing
2.3 Implementation of MQTT-Based Sensors
2.4 Appliance Control and Automation System Architecture
3 Results and Discussion
3.1 Room Occupancy Accounting
3.2 Appliance Control and Automation System
4 Conclusion
References
Multi-scale Defect Detection Network for Tire Visual Inspection
1 Introduction
2 Multi-scale Defect Detection Network
2.1 Semantic-Aware Network
2.2 Texture-Aware Network
2.3 Multi-scale Network Integration
2.4 Preprocessing and Training
3 Experiments
3.1 Implementation Details
3.2 Ablation Experiments
3.3 Comparison with State-of-the-Art Methods
4 Conclusion
References
Guided Filter Bank
1 Introduction
2 Related Works and Motivations
3 Guided Filter Bank
3.1 Case 1 : h=2
3.2 Case 2 : h=1
3.3 Case 3 : h=12
4 Analysis of the Filters
4.1 Properties of GF and L1 GF
4.2 Property of L0.5 GF
5 Applications
5.1 Image Smoothing
5.2 Image Denoising
5.3 Edge Detection
5.4 Image Detail Enhancement
5.5 X-Ray Image Enhancement
6 Conclusion
References
High-Speed Multi-person Tracking Method Using Bipartite Matching
1 Introduction
2 Related Work
3 Our Approach
3.1 Single Frame Pose Estimation
3.2 Tracking Task Description and Definitions
3.3 Cost Function
3.4 Visual Feature Matching
3.5 Track Matching and Update
4 Experiments
4.1 The PoseTrack Dataset
4.2 Experiment Details
4.3 Results
5 Discussion
5.1 Dataset Challenges
5.2 Study Limitations and Future Research
6 Conclusion
References
Modular Image Synthesizer for Annotated Test Sets on Incremental Parameter Fields
1 Introduction, Related Work
2 Ground Truth Synthesizer
2.1 Overview
2.2 System Structure
2.3 Rendering and Saving of Metadata
2.4 Parameter
2.5 Metadata
3 Dataset Generation First Run
4 Dataset Testing: Running Object Detector on the Generated Dataset
5 Summary and Outlook
References
Learning Action Correlation and Temporal Aggregation for Group Representation
1 Introduction
2 Related Work
3 Method
3.1 Visual Feature Extraction
3.2 Action Correlation
3.3 Temporal Aggeration
3.4 Inference
4 Experiments
4.1 Datasets
4.2 Implementation Details
4.3 Results and Analysis
5 Conclusions
References
Self-adaptive Perception Model for Action Segment Detection
1 Introduction
2 Related Work
2.1 Action Analysis
2.2 Action Detection
3 Method
3.1 Problem Formulation
3.2 Our Proposed Model (Fig.1)
3.3 Visual Encoding (Fig.2)
3.4 Boundary Prediction (Fig.3)
3.5 Discriminator
3.6 Learning
4 Experiments
4.1 Dataset and Setup
4.2 Details
4.3 Performance
4.4 Ablation Study
4.5 Comparison with Published Methods
5 Conclusion
References
Hierarchical Feature Generating Network for Zero-Shot Learning by Knowledge Graph
1 Introduction
2 Related Work
2.1 Zero-Shot Learning
2.2 Generative Adversarial Network
3 Approach
3.1 Problem Definition
3.2 An Overview of Framework
3.3 Aggregation Model
3.4 Hierarchical-GAN for Feature Generation
3.5 Zero-Shot Classification and Iteratively Learning
3.6 Network Details
4 Experiments
4.1 Datasets
4.2 Evaluations
4.3 Effectiveness of HGAN
4.4 GZSL Results
5 Discussion and Conclusion
References
Comparing Partitions: Metric Characterizations, Mean Partition, and Distortion
1 Introduction
2 The Space of Partitions
3 Characterizing Measures for Comparing Partitions
3.1 Characterizing Metrics Associated to Lower Valuations
3.2 Characterizing Metrics Associated to Upper Valuations
4 Consensus of Partitions
4.1 Mean Partition and q-Quota Rules
4.2 VI, dK and d in the Ambit of Consensus
5 Reduction of the Search Space
6 How Does the Space of Partitions Distort When a Metric d is Replaced by Another d\'?
7 Conclusions
References
A Preliminary Comparison Between Compressive Sampling and Anisotropic Mesh-Based Image Representation
1 Introduction
2 Compressive Sampling and Mesh-Based Image Representation
2.1 Compressive Sampling
2.2 AMA Representation
3 Comparison Results
3.1 Comparison Metrics
3.2 Comparison Results
4 Conclusions
References
Self-exciting Point Processes with Image Features as Covariates for Robbery Modeling
1 Introduction
2 Related Work
3 Methodology
4 Implementation
5 Results
6 Deployment for the Allocation of Law Enforcement Resources
6.1 Hotspots Prediction
6.2 Surveillance Cameras System
6.3 Location-Allocation of Police Stations
7 Conclusions
References
Development of an Automatic Document to Digital Record Association Feature for a Cloud-Based Accounting Information System
1 Introduction
2 Related Literature
2.1 Image Enhancing Methods
2.2 Use of Optical Character Recognition Technology
2.3 Information Retrieval
2.4 Automated Association of Digitized Documents to Digital Records
3 Methodology
3.1 Information System Development
3.2 Performance Evaluation Method
3.3 Image Cropping
3.4 Image Color Pre-processing
3.5 Information Retrieval
3.6 Database Record Association
4 Results and Discussion
4.1 Results
5 Conclusion
References
Improving Accuracy and Latency in Image Re-identification by Gallery Database Cleansing
1 Introduction
1.1 Nomenclature
2 Background
3 Problem Definition
4 Related Work
5 Our Approach
6 Results
7 Future Work/Work in Progress
8 Conclusion
References
Real-Time Crack Detection Using ROV
1 Introduction
2 Method
2.1 ROV Design
2.2 Classical Detection Algorithm
3 Results and Discussions
4 Conclusion
References
Web-Based Learning for Cultural Adaptation: Constructing a Digital Portal for Persian Speaking Immigrants in Finland
1 Introduction
2 Context of the Study
3 Background of the Study
4 The Designed Digital Portal for Cultural Adaptation
4.1 Theory to Practice
4.2 Designing the Portal
4.3 Driving a Practical Test Website
5 Principles for Creating the Website
5.1 Sensible Classification
5.2 Simplicity
5.3 Meaningfulness
5.4 Minimality
5.5 Clear Instruction
5.6 Feedback
6 Results
7 Limitations
8 Conclusion
References
Enhanced Reinforcement Learning Model for Extraction of Objects in Complex Imaging
1 Introduction
2 Related Work
2.1 Region-Based Segmentation
2.2 Edge-Based Segmentation
2.3 Clustering-Based Segmentation
2.4 Other Method
2.5 Region Growing
3 Results of Our Algorithm
3.1 Our Algorithm and Results
4 Conclusions
References
Causal BERT: Language Models for Causality Detection Between Events Expressed in Text
1 Introduction
2 Event-Structure and Causality in Natural Language Text
3 Dataset
4 Problem Definition and Proposed Methodology
4.1 Methodology
4.2 Problem Definition
4.3 Models
5 Experiments and Results
5.1 Experiments
5.2 Learning Setup: Experiment Settings
5.3 Results and Analysis
6 Related Work
7 Conclusion
References
Social Media Mining for Business Intelligence Analytics: An Application for Movie Box Office Forecasting
1 Introduction
2 Theoretical Background
3 Methodology
3.1 Sample and Information Sources
3.2 Mining Methods
3.3 Variables
3.4 Methods
4 Results
5 Discussion
6 Conclusions
References
Solving the Story Cloze Test Using Graph Feature Extraction
1 Introduction
2 Related Works
3 Data
3.1 SCTv1.0
3.2 SCTv1.5
4 Models and Methods
4.1 NLP Information
4.2 Word Embeddings
4.3 Sentiment Analysis
4.4 Sequential Graphs
4.5 Graph Analysis
4.6 Graph Featurization
4.7 ML Models
4.8 Metrics
5 Experiments
5.1 Word Embedding Results
5.2 Sentiment Results
5.3 NLP Integration Results
5.4 Cluster Analysis
5.5 ML Results
6 Analysis
6.1 Word Embedding
6.2 Sentiment Analysis
6.3 NLP Integration
6.4 Cluster Analysis
6.5 ML Models
6.6 Error Analysis
7 Conclusion
References
MegaLite-2: An Extended Bilingual Comparative Literary Corpus
1 Introduction
2 Related Works
3 The MegaLite-2 Corpora
3.1 Pre-processing
3.2 The Spanish Corpus: Megalite-Es
3.3 The French Corpus MegaLite-Fr
4 Word2vec Training: Embeddings
5 Study on the Parallel Corpora
5.1 POS Version
5.2 Lemmas Version
6 N-grams Language Model
7 Study Using Divergence of Probability Distribution
7.1 Jensen-Shannon Divergence
7.2 DJS Results
8 Conclusion and Final Remarks
References
VBSRL: A Semantic Frame-Based Approach for Data Extraction from Unstructured Business Documents
1 Introduction and Motivations
1.1 Motivations
2 State of the Art
3 Theory of VBSRL
3.1 VBSRL by Examples
4 Conclusions
References
Generating Correction Candidates for OCR Errors using BERT Language Model and FastText SubWord Embeddings
1 Introduction
2 Literature Review
3 Methodology
3.1 BERT
3.2 FastText
4 Results
5 Conclusion and Future Work
References
Measuring Meaning
1 Introduction
2 Semantic Representation
3 Participants and Cognate Semantic Roles
4 Related Work
5 The Raison d’être of the Pairings
6 Question Answering
7 Methodology
8 Meaning Measured
9 Concluding Remarks
References
The Impact of Agile Methods and “DevOps” on Day 2+ Operations for Large Enterprises
1 Introduction
2 Background
3 Understanding Day 2+ Operations
3.1 Challenge: Sustainment in a Continuous Engineering Model
3.2 Challenge: Balancing Information Technology (IT) Operations
4 Case Study
5 Enabling Operations to Take Advantage of Agile and DevOps
5.1 Enhance Day2 + Operations and Continuous Sustainment
5.2 Encourage Community Operations Collaboration
5.3 Empower Operators as “Citizen Coders”
6 Conclusions
References
Mapping Risk Assessment Strategy for COVID-19 Mobile Apps’ Vulnerabilities
1 Introduction
2 Background
3 Method
4 Result and Possible Solutions
4.1 Credential Leaks
4.2 Insecure Communication
4.3 HTTP Request Libraries
5 App’s Privacy Risk Assessment Strategy
6 Discussion
7 Conclusion
References
Explainable Graph-Based Search for Lessons-Learned Documents in the Semiconductor Industry
1 Introduction and Research Purpose
2 Background and Related Work
3 Search Methods
3.1 Multidimensional Domain-Specific Knowledge Graph
3.2 Explainable Graph Search Functionality
3.3 Search Interface and Feedback Collection
4 Evaluation and Results
5 Conclusion and Future Perspectives
References
Improving the Efficiency of Industrial Enterprise Management Based on the Forge Software-analytical Platform
1 Introduction
2 Scientific-Technical Solution
2.1 Increasing the Productivity of the Technological Processes
2.2 Increasing the Productivity of Process Control
2.3 Increasing Asset Productivity
2.4 Increasing Staff Productivity
2.5 Increasing the Productivity of the Enterprise as a Whole
2.6 Cyber-Security Aspect in Forge Platform
3 Conclusion
References
Consumer-Oriented Web of Things Solution for Competitive Swimmers
1 Introduction
2 Related Work
3 Solution Approach
4 System Overview
5 Limitations
6 Implementation Details
7 Validation and Evaluation
8 Future Work
9 Conclusion
References
Factors Influencing the Adoption of Online Banking in South Africa: An UTAUT Study
1 Introduction
2 Online Banking
3 Theoretical Framework
3.1 Unified Theory of Acceptance and Use of Technology
3.2 Development of Hypotheses
3.3 Moderating Factors
4 Research Model
5 Research Methodology
6 Data Analysis
7 Future Work
8 Conclusion
References
Machine Learning Application in LAPIS Agile Software Development Process
1 Introduction
2 Related Studies
3 LAPIS (Logo Agile Process Improvement System)
4 Retrospective Study
5 Measurement and Improvement Method
6 Machine Learning Sentiment Analysis
7 Sentiment Analysis of Retrospective Data
7.1 Data Preprocessing
7.2 Modeling
7.3 Evaluation
8 Results and Future Studies
References
Transforming HR and Improving Talent Profiling with Qualitative Analysis Digitalization on Candidates for Career and Team Development Efforts
1 Introduction
2 Creating the Questionnaire Set
3 Text Analysis
4 Data Analysis and Visualizations
5 Population in Group
6 Similarity in a Group
7 Discussion
8 Conclusions and Future Research Recommendations
References
Author Index