توضیحاتی در مورد کتاب Intelligent Computing: Proceedings of the 2022 Computing Conference, Volume 1
نام کتاب : Intelligent Computing: Proceedings of the 2022 Computing Conference, Volume 1
عنوان ترجمه شده به فارسی : محاسبات هوشمند: مجموعه مقالات کنفرانس محاسبات 2022، جلد 1
سری : Lecture Notes in Networks and Systems, 506
نویسندگان : Kohei Arai
ناشر : Springer
سال نشر : 2022
تعداد صفحات : 930
ISBN (شابک) : 3031104609 , 9783031104602
زبان کتاب : English
فرمت کتاب : pdf
حجم کتاب : 86 مگابایت
بعد از تکمیل فرایند پرداخت لینک دانلود کتاب ارائه خواهد شد. درصورت ثبت نام و ورود به حساب کاربری خود قادر خواهید بود لیست کتاب های خریداری شده را مشاهده فرمایید.
فهرست مطالب :
Editor’s Preface
Contents
Estimation of Velocity Field in Narrow Open Channels by a Hybrid Metaheuristic ANFIS Network
1 Introduction
2 Data Collection
3 ANFIS-GA/SVD
3.1 A Subsection Sample
3.2 Optimization of ANFIS by GA
3.3 Application of SVD in Design if ANFIS
4 Results and Discussion
5 Conclusions
References
Development of a Language Extension for Configuration of Industrial Asset Capabilities in Self-organized Production Systems
1 Introduction
2 Method
2.1 Research Questions
2.2 Conducting the Systematic Mapping Study
2.3 Proposal of the Extension Architecture
2.4 Test Against SSOP Systems
3 Results and Background
3.1 Modeling Capabilities and Capability Matchings
3.2 Self-organized Production Systems
4 VS Code Architecture
4.1 Xtext LSP
4.2 Integration of the Extension
5 Conclusion and Future Work
5.1 Findings in Developing the VSCode Extension
5.2 Limits and Future Directions
References
Open-Source Mapping Method Applied to Thermal Imagery
1 Introduction
2 Related Work
3 Proposed Method
4 Experimental Results
5 Validation
6 Discussion
7 Conclusion and Future Work
References
Scalable Computing Through Reusability: Encapsulation, Specification, and Verification for a Navigable Tree Position
1 Introduction
2 Related Work
3 Encapsulating a Navigable Tree Position in a Data Abstraction
4 A Reusable Exploration Tree Data Abstraction
4.1 A General Tree Theory
4.2 A Formal Specification of an Exploration Tree Data Abstraction
5 Modular Verification as a Step Toward Scalability
5.1 Results
5.2 Discussion
6 Conclusion and Future Work
References
Generalizing Univariate Predictive Mean Matching to Impute Multiple Variables Simultaneously
1 Introduction
2 Multivariate Predictive Mean Matching
2.1 Canonical Regression Analysis (CRA)
2.2 Predictive Mean Matching (PMM)
2.3 Multivariate Predictive Mean Matching (MPMM)
3 Comparison Between PMM and MPMM
3.1 Simulation Conditions
3.2 Results
4 Evaluation
4.1 Linear Regression with Squared Term
4.2 Linear Regression with Interaction Term
4.3 Incomplete Dataset with Inequality Restriction X1 + X2 C
5 Conclusion
References
Timeline Branching Method for Social Systems Monitoring and Simulation
1 Introduction
2 State of the Art
3 Situational Model
4 A Timeline Branching Method
5 Implementation
6 Results
7 Conclusion
References
Webometric Network Analysis of Cybersecurity Cooperation
1 Introduction
2 Cyberspace Cooperation and Partnership
3 Methods
3.1 Data Collection
3.2 The Process
3.3 Techniques and Concepts
4 Results
4.1 EU Networking Pattern Results
4.2 NATO
5 Discussion
6 Conclusions
6.1 Future Work
References
Safety Instrumented System Design Philosophy Paradigm Shift to Achieve Safe Operations of Interconnected Operating Sites
1 Introduction
1.1 SIS Overview
2 Proposed Design Model
2.1 SIS System Changes
2.2 Operational Model
3 Implementation Requirements and Best Practices
3.1 Computing
3.2 Network and Communication System Changes
3.3 Cybersecurity
4 Process Safety Time
5 Human Factors
6 Compartive Analysis
7 Future Work
8 Conclusion
References
Bifurcation Revisited Towards Interdisciplinary Applicability
1 Introduction
2 Bifurcation Analysis
2.1 Applications of Bifurcation Analysis in Logistics and Other Research Fields
2.2 Bifurcation Analysis with Matlab
2.3 Bifurcation Analysis with Mathcad
3 Suggested Bridging of Soft and Hard Sciences with Bifurcation Analysis
4 Conclusion and Outlook
References
Curious Properties of Latency Distributions
1 Introduction
2 Related Work
3 Preliminaries
3.1 Discrete Delay
3.2 Power Series Representing Distributions
3.3 Expanding Two Series to the Same Length
3.4 Series Modulus
4 Latency Distributions
4.1 Introducing Improper CDF
4.2 Canonical Form
4.3 Construction from PDF and CDF
4.4 Intuitive Properties of Latency Distributions
4.5 Basic Operations on Q
4.6 Bounds on Distributions
5 Representing Networks
6 Histogramming
6.1 Sum of Mutually Exclusive Events
6.2 K-out-of-N Synchronization of Series of Events a_k
6.3 Averaging Broadcast from Different Nodes
7 Summary
7.1 What for Capacity-Limited Networks?
7.2 Relation of Latency to Other Plausible Metrics of Network Performance
7.3 Interesting Properties
7.4 Future Work
References
Multicloud API Binding Generation from Documentation
1 Introduction
2 Implementation
3 Conclusion
3.1 Limitations
3.2 Related Work
3.3 Evaluation
3.4 Summary
References
Reducing Web-Latency in Cloud Operating Systems to Simplify User Transitions to the Cloud
1 Introduction
2 Related Work
2.1 Premise
2.2 XML Operating Systems and Streaming Applications
2.3 Performance
2.4 Architecture and Scalability
3 Design and Implementation
3.1 Project Resources and Development
3.2 Latency Measurements
4 Evaluation
4.1 Cloud Operating System Comparison
4.2 Initial Setup
4.3 Writing Data and Storage
4.4 Reading Data and Storage
4.5 Caching System
5 Limitations
5.1 Caching Prediction Accuracy
5.2 Machine Learning Models
5.3 Server Resources
5.4 Study Comparison
6 Conclusion
6.1 Overview
6.2 Future Plans
References
Crescoware: A Container-Based Gateway for HPC and AI Applications in the ENEAGRID Infrastructure
1 Introduction
2 Containerized HPC/AI Applications
3 Crescoware Interface
4 System and Software Architecture
5 Conclusions and Future Developments
References
Significance in Marlo Diagrams Versus Thoroughness of Venn Diagrams
1 Elementary Propositions in Marlo and Venn Diagrams
2 Main Elements of Marlo Diagram
3 Existential Import of Propositions in Marlo Diagram
4 Elementary Notation and Building Rules in Marlo Diagram [9]
5 Comprehensive Coding of Possibilities
6 Correspondence of Marlo Diagram with the Truth Tables
7 Conclusions
References
A Hybrid Real-Time Scheduling Mechanism Based on Multiprocessor for Real-Time Tasks in Weakly Hard Specification
1 Introduction
2 Real-Time Paradigms and Design Issues
3 Proposed Hybrid Scheduling Approach
4 Models of Hybrid Multiprocessor Real-Time Scheduling Approach
5 An Experimental Result on Case Studies
5.1 Videophone Application
5.2 Inertial Navigation System (INS)
5.3 Autonomous Mobile Robot (AMR)
6 Performance Evaluation
7 Performance Comparison
8 Conclusion
References
Simulating the Arnaoutova-Kleinman Model of Tubular Formation at Angiogenesis Events Through Classical Electrodynamics
1 Introduction
2 Physics of Arnaoutova-Kleinman Model
2.1 Presence of Endothelial Cells
2.2 Random Attachment
2.3 Apparition of bFGF Proteins
2.4 Formation of Tubules
2.5 Current Associated to the Tubule Formation
3 Simulations
4 Conclusion
References
Virtual Critical Care Unit (VCCU): A Powerful Simulator for e-Learning
1 Introduction
2 Method
2.1 Design and Development
2.2 Integration of Scenarios
2.3 Experiment
3 Results
4 Discussion
References
Silence in Dialogue: A Proposal and Prototype for Psychotherapy
1 Introduction
2 Preliminares
3 Silence Management in Psychotherapeutic Dialogue
4 Discussion
5 Conclusion and Future Work
References
A Standard Content for University Websites Using Heuristic Evaluation
1 Introduction
2 Related Works
3 Methodology
4 Result and Analysis
4.1 Phase 1
4.2 Phase 2
4.3 Phase 3
5 Conclusion
References
Development of a Mobile Application to Provide Employment Information to Private-Sector Workers in Peru
1 Introduction
2 Related Work
3 Materials and Methods
3.1 Scrum Framework
3.2 Requirements (User History)
3.3 Interface Design
3.4 Architecture Design
3.5 Construction and Testing (Code Faster – Lean Startup)
4 Results
5 Conclusions
References
Analysis of Technical Factors in Interactive Media Arts, with a Focus on Prix Ars Electronica Award Winners
1 Introduction
1.1 Research Background and Purpose
1.2 Importance of the Research
1.3 Overview of the Research
2 Related Work
3 Interactive Media Art
3.1 Definition of Interactive Media Art
3.2 Characteristics of Interactive Media Art
4 Media Art International Competition Winner Analysis
4.1 Prix Ars Electronica
4.2 Winner of the “Interactive Art+” Category
5 Discussion and Future Work
6 Conclusion
References
Usability Evaluation of Mobile Application Software Mockups
1 Introduction
2 Methodology
2.1 Materials
2.2 Method
3 Results and Discussion
3.1 User Testing
3.2 Questionnaire Technique
4 Conclusions
References
EasyChat: A Chat Application for Deaf/Dumb People to Communicate with the General Community
1 Introduction
2 Literature Review
3 Methodology
3.1 Conversion of BSL into Simple English Language
3.2 Conversion of Lip Reading into Simple English Language
3.3 Conversion of Makaton into Simple English Language
3.4 Conversion of Voice/Audio Clips into Gestures and Symbols
4 Result and Discussion
5 Conclusion and Future Works
References
Influence of Augmented Reality on Purchase Intention
1 Introduction
2 Methodology
2.1 Defining the Problem
2.2 Respondents and Research Questions
2.3 Measuring Instruments and Procedure
3 Results
4 Discussion
5 Conclusions
Appendix A
References
Encountering Pinchas Gutter in Virtual Reality and as a “Hologram”: Immersive Technologies and One Survivor’s Story of the Holocaust
1 Introduction
1.1 Pinchas Then: A Quick Introduction
1.2 Pinchas the Camera and the Educator
2 Case Study
2.1 Pinchas Today: The Pilgrim-Pioneer of New Technology
3 Discussion: Emerging Technologies and the Testimony of One Holocaust Survivor
3.1 Virtual Reality and Pinchas Gutter
3.2 Virtual Reality and The Last Goodye
3.3 Pinchas Gutter 2-D Awaiting the Day He Will Become 3-D
4 Conclusion: Travelers and Visitors
References
Strided DMA for Multidimensional Array Copy and Transpose
1 Introduction
2 Motivation
3 Related Work
4 Benchmarks
5 Results
5.1 GPU Results
5.2 Network Results
6 Discussion
6.1 Strided DMA Application Programmer\'s Interface (API)
6.2 Strided DMA Hardware Interface
6.3 Strided DMA Hardware Execution
6.4 Transpositions
6.5 Hardware Hints
7 Conclusion
References
The Machine Learning Principles Based at the Quantum Mechanics Postulates
1 Introduction
2 The Machine Learning as Quantum Mechanics Postulates
3 Postulate 1: The Amplitude Probability Is a Task
4 Postulate 2: The Amplitude and Strategies of Observation
5 Postulate 3: Viability of Observation and Efficiency of Measurement
5.1 The Case of Free Particle
5.2 The Quantum Mechanics Observation
5.3 The Quantum Mechanics Operators of Machine Learning
6 Conclusion
References
The Threat of Quantum Computing to SMEs
1 Quantum Computing and Cryptography as Currently Relevant Topics
2 Current State of Quantum Computing
3 SME: Vulnerable to Digital Threats?
4 Industries Particularly at Risk in Terms of IT Security
5 Data Protection for SMEs Under the Threat of Quantum Computing
6 Conclusion and Future Research Opportunities
References
Quantum Computation by Means of Josephson Junctions Made of Coherent Domains of Liquid Water
1 Introduction
2 The Two-Phases Picture of Water According to QED
2.1 A Brief Overview of QED Coherence in Matter
2.2 Coherent Domains in Water and Their Excited States
3 Water Coherent Domains as a Superconductor Systems and Josephson Junctions
3.1 Superconductivity and Some of Its Main Features
3.2 Coherent CD of Water as a Superconductor Medium
3.3 Cylindrical-Shaped Water Coherent Domains
3.4 Coupled Water Coherent Domains as Josephson Junction
4 Quantum Computation Through Josephson Junctions Made of Water CDs
5 Conclusion
References
Customer Response Modeling Using Ensemble of Balanced Classifiers: Significance of Web Metrics
1 Introduction
2 Literature Review
3 Methodology
3.1 Data
3.2 Methods
3.3 Model Performance Measures
3.4 Predictive Procedure
4 Results and Discussion
5 Conclusion
References
What Augmentations are Sensitive to Hyper-Parameters and Why?
1 Introduction
2 Literature Review
2.1 Data Augmentation Techniques
2.2 Other Augmentations Techniques
2.3 Applying Augmentations
3 Methodology
3.1 Machine Learning Model
3.2 HyperParameters
3.3 Data
3.4 Lime Analysis
4 Results
4.1 Accuracy Plots
4.2 Loss Plots
4.3 Evaluation Criteria
5 Discussion
6 Conclusion
References
Draw-n-Replace: A Novel Interaction Technique for Rapid Human-Correction of AI Semantic Segmentation
1 Introduction
2 Related Work
3 Problems in Interactive Segmentation for Pixel-Level Labeling
4 Interactive Segmentation Pipeline with Draw-n-Replace Interaction
4.1 Machine Segmentation and Vertices Generation
4.2 The Draw-n-Replace (DnR) Interaction
5 Evaluation of Draw-n-Replace Interaction
5.1 Method
5.2 Metrics
5.3 Results
6 Conclusion
References
Working Towards an AI-Based Clustering of Airports, in the Effort of Improving Humanitarian Disaster Preparedness
1 Introduction
2 Knowledge Gap and Research Goal
2.1 Literature Review
2.2 Research Goal
3 Methodology
4 Building the Database
4.1 Data Sources
4.2 Extracting Data
4.3 The Database
5 Limitations
6 Discussion and Conclusion
6.1 Future Research
A Appendix 1
B Appendix 2
C Appendix 3
D Data Pre-processing
D.1 Empty fields
D.2 Categorical data
D.3 Numerical data
References
Wind Turbine Surface Defect Detection Analysis from UAVs Using U-Net Architecture
1 Introduction
2 Background
2.1 Convolutional Neural Network (CNN)
3 Algorithm
3.1 UNet Architecture
3.2 Training
3.3 Crack Assesment
4 Performance Assessment
5 Scaling Efficiency
6 Conclusion
References
Anomaly Detection Using Deep Learning and Big Data Analytics for the Insider Threat Platform
1 Introduction
2 Insider Threat
2.1 Insider Threat Overview
2.2 Current Insider Threat Detection Methods
3 Anomaly Detection
4 Methodology
4.1 Survey into Deep Anomaly Detection Algorithms
4.2 Choice of Approach
4.3 Dataset
4.4 Tools
5 Research Implementation
5.1 Addressing Challenges
5.2 Data Extraction
5.3 Data Redundancy
5.4 Data In-Homogeneity
5.5 Rule-based Detection
5.6 Anomaly-Based Detection
6 Evaluation and Results
6.1 Analysis of Detection Performance
6.2 Discussion of Influencing Factors
6.3 Evaluation of Risk Mitigation Via Detection
7 Conclusion
8 Future Work
References
Near Infrared Spectra Data Analysis by Using Machine Learning Algorithms
1 Introduction
2 Apparatus
3 Machine Learning Algorithms
3.1 Classification
3.2 Regression
4 Results and Discussions
4.1 NIR Spectra Classification
4.2 NIR Spectra Regression
4.3 NIR Spectra Regression Based on the First and the Second Derivative
4.4 NIR Spectra Regression Based on Reflectance Spectra and Different Skin Sites
5 Conclusions
References
On Regret Bounds for Continual Single-Index Learning
1 Introduction
2 Continual Single-Index Setting
2.1 Setting
2.2 A Randomized Strategy for Continual Single-Index Learning
3 Regret Bounds
3.1 Bound with Expectation
3.2 Uniform Bound
3.3 Bounds with Monte Carlo Approximation
4 A Within-Task Algorithm
4.1 EWA for Online Single-Index Learning
4.2 A Detailed Regret Bound
5 Discussion and Conclusion
6 Proofs
6.1 Proof of Theorem 1
6.2 Proof of Proposition 1
References
Text to Image Synthesis Using Stacked Conditional Variational Autoencoders and Conditional Generative Adversarial Networks
1 Introduction
2 Related Work
3 Preliminaries
4 Proposed Model Architecture
4.1 Conditioning Augmentation
4.2 Stage I: Conditional VAE (C-VAE)
4.3 Stage II: Conditional Generative Adversarial Network (C-GAN)
4.4 Hyper-parameter Optimization
4.5 Datasets and Pre-processing
5 Evaluation of Model Performance
5.1 Experimental Results
6 Discussion of Results
7 Conclusions
References
Analytical Decision-Making System Based on the Analysis of Air Pollution in the City of Nur-Sultan
1 Introduction
1.1 Overview of the Current Ecology Situation
1.2 Analysis of the General State of the Air Basin of the Republic of Kazakhstan
1.3 Almaty Case Study
2 Analyzing Data from LLC “KORKEM TELECOM”
2.1 Data Overview
2.2 Results
3 Conclusion
References
A Local Geometry of Hyperedges in Hypergraphs, and Its Applications to Social Networks
1 Introduction
2 A Class of Metrics Modulo Certain Equivalence Relations for the Set of Hyperedges of a Hypergraph, and Methodologies
2.1 Metric Spaces Modulo Equivalence Relations
2.2 Methodology
2.3 A Class of Metrics for the Set of Hyperedges of a Hypergraph
3 Experimental Analysis
4 Conclusion
References
Extraction of Consumer Emotion Using Diary Data on Purchasing Behavior
1 Introduction
2 Purpose
3 Dataset
4 Creation and Evaluation of Emotional Expression Dictionary
4.1 Adding the New Emotion Words to the Emotional Expression Dictionary
4.2 Calculation of Emotional Values for Emotion Words
4.3 Evaluation of the Created Emotional Expression Dictionary
5 Discussion
6 Conclusion
References
Significance in Machine Learning and Data Analytics Techniques on Oceanography Data
1 Introduction
1.1 ADCP
2 Literature Review
3 Methods
3.1 Data Processing
3.2 Self Organizing Maps
3.3 Principle Component Analysis
4 Results
4.1 SOM
4.2 PCA
5 Discussion
6 Conclusion
References
Applying Latent Dirichlet Allocation Technique to Classify Topics on Sustainability Using Arabic Text
1 Introduction
2 Related Work
3 Methodology
4 Results and Discussion
5 Conclusion and Future Work
References
Metrics for Software Process Quality Assessment in the Late Phases of SDLC
1 Introduction
2 Related Work
3 Research Method
3.1 Research Questions
3.2 Search Strategy
3.3 Inclusion Criteria and Quality Assessment
4 Results
4.1 What are the Late Phases of Software Development Process Life Cycle?
4.2 What are the Existing Software Quality Assessment Methods?
4.3 What are the Existing Software Quality Metrics in the Late Phases of SDLC that Can Be Tracked with the Help of DevOps Tools?
5 Proposed Framework
6 Discussion
7 Conclusion
References
Online Quantitative Research Methodology: Reflections on Good Practices and Future Perspectives
1 Introduction
2 Conceptual Background
3 Methods and Materials
3.1 Criteria of Search and Source Identification
3.2 Extraction of Data and Analysis
4 Results
4.1 Educational Occurrences in Very Different Training Environments (Conventional and Unconventional)
4.2 Social or Psychological Aspects (Dedication, Gratification, Nervous Tension, Realization), etc. Build on Web Activities
4.3 Dysfunctional or Unprecedented Behaviors Concerning the New Practices of Online Work and Learning Fully
4.4 Construct or Adapts New Techniques for Analysing the Present Reality of Research
4.5 Procedure for Application of Diverse Organizational Systems that Deals with the Opportunities and Risks of Online Work
4.6 Summary of Data
5 Conclusion
5.1 Limitations
5.2 Implications of this Research
5.3 Recommendations for Future Research
References
Application of Machine Learning in Predicting the Impact of Air Pollution on Bacterial Flora
1 Introduction
2 Materials and Methods
2.1 Sampling for Air Quality and Microbiological Data
2.2 Machine Learning Methodology
3 Results and Discussion
4 Conclusion
References
Markov Chains for High Frequency Stock Trading Strategies
1 Introduction
2 Literature Review
2.1 From Random Walks to Markov Chains
2.2 Decision Process
2.3 Stock Trading
3 Methodology
4 Decision-Making Strategy and Development
5 Results, Discussion and Further Development
References
Scalable Shapeoid Recognition on Multivariate Data Streams with Apache Beam
1 Introduction
2 Background and Related Work
2.1 Apache Beam
2.2 Recap Scotty
2.3 Related Work
3 Beaming Scotty
3.1 Pipeline Input/Output
3.2 Data Time Management
3.3 Windowing
3.4 Keyed Value Processing
3.5 The Beam-Scotty Pipeline
4 Experimental Evaluation
4.1 Setup
4.2 Beam-Scotty for NetFlow Monitoring
4.3 Analysis
4.4 Results
5 Conclusion
References
Detection of Credit Card Frauds with Machine Learning Solutions: An Experimental Approach
1 Introduction
2 Related Work
3 Methods and Data
4 Experiments and Results
5 Discussion
6 Conclusions
References
ALBU: An Approximate Loopy Belief Message Passing Algorithm for LDA for Small Data Sets
1 Introduction
1.1 Topic Extraction in the Presence of Less Data
1.2 Inference Algorithms for LDA
1.3 Loopy Belief Propagation and Update Algorithms
1.4 Other Message Passing Algorithms for LDA
1.5 Our Contribution
2 Message Passing Background
3 The Graphical Representation and Message Passing Schedule for ALBU
3.1 Notation and Graphical Representation of LDA
3.2 Loopy Message Passing Schedule for ALBU
4 The ALBU Algorithm
4.1 Topic-Document Dirichlet Clusters,
4.2 Topic-Document Polya Clusters,
4.3 Word-Topic Conditional Polya Clusters,
4.4 Word-Topic Dirichlet Set Cluster,
5 Method
5.1 Text Corpora
5.2 Metric and Hyperparameter Selection
6 Results
6.1 20 Newsgroup Corpus
6.2 Covid Tweets
7 Discussion
7.1 Algorithmic Comparison
8 Conclusion
References
Retrospective Analysis of Global Carbon Dioxide Emissions and Energy Consumption
1 Introduction
2 Literature Review
3 Data Analysis
3.1 Carbon Emissions Introductory Analysis
3.2 Carbon Emissions Breakdown by Region
3.3 Energy Consumption
3.4 Renewable Energy Consumption
4 Conclusion
References
Application of Weighted Co-expressive Analysis to Productivity and Coping
1 Introduction
1.1 Research Questions
1.2 Purpose of the Study
2 Study Participants
3 Research Methods
3.1 Data of the Student’s Electronic Diary
3.2 Questionnaire “Methods of Coping Behavior” Lazarus [5]
3.3 Research Techniques
4 Results
4.1 Correlation Analysis
4.2 Network Analysis
5 Findings
6 Conclusion
7 Future Work
References
An Improved Architecture of Group Method of Data Handling for Stability Evaluation of Cross-sectional Bank on Alluvial Threshold Channels
1 Introduction
2 Materials and Method
2.1 Experimental Model
2.2 Overview of the Rational Model
2.3 Improved Architecture of the Group Method of Data Handling (IAGMDH)
2.4 Error Measures
3 Results and Discussion
3.1 Verification of GMDH-Based Models, NLR, and Previous Rational Relations in Predicting the Profile Shape Characteristic of a Stable Channel
3.2 Bank Profile Shape Prediction by IAGMDH in Different Hydraulic Conditions
4 Conclusions
References
Increasing Importance of Analog Data Processing
1 Rapidly Changing Real World
2 Sensing and Actuation
3 Human Movements
4 Mahalanobis Distance (MD): Ordinal Approach
5 Real World and Industrial World
6 Communication: Verbal and Non-verbal
6.1 Mind, Body and Brain
6.2 What Octopuses and Babies Teach Us
7 Emotion
8 Patterns
8.1 Detecting Emotion from Face
9 Mahalanobis Distance-Pattern (MDP) Approach
9.1 Basic Concept of MDP: Swimming as an Example
9.2 From Individual to Team: Soccer as an Example
10 Instinct
11 Self-sustaining and Self-satisfying Society: Society in the Next Generation
References
New Trends in Big Data Profiling
1 Introduction
2 Materials and Methods
2.1 Plan Review
2.2 Conducting the Review
2.3 Document Review
3 Results
3.1 RQ1: What Are the Most Used Tools for Big Data Profiling?
3.2 RQ2: What Are the Areas of Application and Datasets Reported to Be Profiled?
3.3 RQ3: What Type of Metadata Did the Papers Collect?
3.4 RQ4: Which Information Is Extracted Using Data Profiling?
3.5 RQ5: What Are the Challenges in Big Data Profiling?
4 Discussion and Conclusions
References
Finding Structurally Similar Objects Based on Data Sorting Methods
1 Introduction
2 Pattern Analysis
2.1 Pattern Analysis: General Statement of the Problem
2.2 The Possibility to Use Data Sorting Algorithms
3 Diffusion-Invariant Pattern Clustering: Possible Implementations
3.1 Alternative Implementation of Diffusion-Invariant Pattern Clustering
3.2 Correction of the Results of Diffusion-Invariant Pattern Clustering
3.3 Case Studies
4 Conclusion
References
Application of the Proposed Thresholding Method for Rice Paddy Field Detection with Radarsat-2 SAR Imagery Data
1 Introduction
2 Related Research Works
3 Proposed Method
4 Experiment
4.1 Procedure
4.2 Experimental Result
5 Conclusion
6 Future Research Works
References
Understanding COVID-19 Vaccine Reaction Through Comparative Analysis on Twitter
1 Background
1.1 Research Questions
2 Related Work
3 Materials and Methods
3.1 Data Collection and Statistics
3.2 Clustering and Labeling
4 Results
4.1 Profiling Vaccine-Related Clusters on Twitter
5 Discussion
6 Conclusion
Appendix
References
A Descriptive Literature Review and Classification of Business Intelligence and Big Data Research
1 Introduction
2 Literature Review
2.1 Big Data
2.2 Business Intelligence
2.3 Business Analytics
3 Research Methodology
3.1 Scope of Literature Search
3.2 Filtering Process
3.3 Classification Scheme
4 Result and Analysis
4.1 Management Aspect
4.2 Technological Aspects
4.3 Application and Domain in the Usage
4.4 Discussion
5 Conclusion and Limitations
References
Data Mining Solutions for Fraud Detection in Credit Card Payments
1 Introduction
2 Data
2.1 Data Benchmark Data
2.2 Preprocessing the Dataset and Designing a Solution
3 Outcome Analysis
4 Experiments
4.1 Decision Tree
4.2 Random Forest
4.3 k-Nearest Neighbours\' Algorithm
5 Conclusions
References
Nonexistence of a Universal Algorithm for Traveling Salesman Problems in Constructive Mathematics
1 Introduction
2 Definitions
3 The Case of General TSPs
4 The Case of Symmetric TSPs
5 Conclusion and Future Work
References
Addition-Based Algorithm to Overcome Cover Problem During Anonymization of Transactional Data
1 Introduction
2 Related Works
3 Formulation of the Problem
3.1 Data and Notations
3.2 Description of the Cover Problem
3.3 Privacy Breach
4 Contributions: Safe Disassociation by Addition Technique
4.1 Presentation of the Proposed Method
4.2 Proof of the Elimination of the Cover Problem by Addition Technique
4.3 Proof of km-Anonymity Guarantee After Addition
4.4 Proposed Algorithm with Description and Correctness
4.5 Illustration of ADCOV
5 Performance Evaluation
5.1 Evaluation Metrics
5.2 Results Analysis
6 Conclusion
References
Author Index