Vai al contenuto principale della pagina
Autore: | Bourbakis Nikolaos |
Titolo: | Extended Selected Papers of the 14th International Conference on Information, Intelligence, Systems, and Applications : Iisa2023 |
Pubblicazione: | Cham : , : Springer, , 2024 |
©2024 | |
Edizione: | 1st ed. |
Descrizione fisica: | 1 online resource (439 pages) |
Altri autori: | TsihrintzisGeorge A VirvouMaria JainLakhmi C |
Nota di contenuto: | Intro -- Foreword -- Contents -- Introduction to Advances in Information, Intelligence, Systems and Applications -- 1 Editorial Note -- 2 Book Summary and Future Volumes -- References -- Novelties in Theory and Advanced Methodologies -- A Multi-dimensional Survey on Learning from Imbalanced Data -- 1 Introduction -- 2 Methodology and Organization -- 3 Application-Based Organization -- 3.1 Cybersecurity -- 3.2 Bioinformatics and Medical Sciences -- 3.3 Natural Language Processing (NLP) -- 3.4 Computer Vision -- 4 Technique-Based Organization -- 4.1 Data Preprocessing and Algorithm Centered Approaches -- 4.2 Cost-Sensitive Learning -- 5 Classifier-Based Organization -- 6 Surveys and Overviews -- 7 Conclusions -- References -- An Expert System for Decision Making in the Face of Imprecise, Inconsistent and Paracomplete Data - Metaverse Security Application Using DLP -- 1 Introduction -- 1.1 Understanding Inconsistency in Expert Systems -- 1.2 Consequences of Inconsistency -- 2 Backgrounds -- 2.1 An Analysis of the Logic Underlying AI Theory -- 2.2 Paraconsistent Logic -- 2.3 AI and Paraconsistency -- 2.4 Paraconsistent Annotated Evidential Logic Eτ -- 2.5 Para-Analyzer Algorithm -- 2.6 An Expert System Based on Logic Eτ -- 3 Application: Metaverse Security Application Using DLP -- 3.1 Metaverse -- 3.2 DLP - Data Loss Prevention -- 3.3 Optimisation of Metaverse Security -- 4 Analysis by the Proposed Expert System -- 5 Conclusion -- References -- Machine Learning and Human Unlearning -- 1 Introduction -- 2 Artificial Intelligence and Machine Learning: Sets and Subsets -- 3 Contextualizing the Generation of Metrics -- 4 Breaking Down the Main Components of the Measurement and Descriptive Statistics -- 5 Statistics, Metrics and Attributes -- 6 The Formation of a Deltoid Structure for Heuristic Evaluation. |
7 Radial Network and Hypothetical Failures of "Intelligent Algorithms" -- 8 User Experiments: Tasks, Strategies and Management -- 9 Results of Heuristic Evaluation -- 10 Towards to Data and Information Quality Vademecum for ML -- 11 Lessons Learned -- 12 Conclusions -- Appendix #1 -- Appendix #2 -- Appendix #3 -- Appendix #4 -- Appendix #5 -- References -- Novel Applications -- Circumstance Evaluation Using Extreme Value Analysis on Charging Station Data: The Case of DEI Blue in Greece -- 1 Introduction -- 2 Theory and Application Highlights of Extreme Value Analysis -- 3 Materials and Methods -- 4 Results -- 5 Conclusions and Future Works -- References -- Explainability Spectrum Analysis of Weather Sequences in Short-Term Load Forecasting -- 1 Introduction -- 2 Dataset and Preprocessing -- 3 Materials and Methods -- 3.1 Interpretable Estimators -- 3.2 Explainability Frameworks and Feature Importance -- 3.3 Explainability Analysis Metrics -- 4 Explainability Spectrum Analysis and Results -- 5 Behavioral Overview of Structural Explainability -- 6 Discussion -- 7 Conclusions and Future Work -- References -- Machine Learning and Thermal Imaging in Precision Agriculture -- 1 Introduction -- 2 Methodology -- 3 Background Knowledge -- 3.1 Machine Learning -- 3.2 Computer Vision -- 3.3 Thermal Imaging -- 3.4 ML and CV for Precision Agriculture -- 3.5 Related Works -- 4 Analysis -- 4.1 Crop Monitoring -- 4.2 Irrigation Management -- 4.3 Pest and Disease Detection -- 5 Challenges and Opportunities of Using TI in Agriculture -- 5.1 Challenges -- 5.2 Opportunities -- 6 Conclusion -- References -- Reinforcement Learning Agents in Precision Agriculture -- 1 Introduction -- 2 Background -- 2.1 Precision Agriculture -- 2.2 Reinforcement Learning -- 2.3 Multi-agent Reinforcement Learning -- 3 Reinforcement Learning in Agriculture -- 3.1 Crop Management. | |
3.2 Water Management -- 3.3 Robot Control -- 3.4 Other -- 4 Discussion -- 5 A General Framework -- 5.1 Simulation Challenges -- 5.2 Research Challenges -- 6 Conclusions -- References -- Inductive Machine Learning for Classifying Breast Lesions from Imbalanced MRI-B Data -- 1 Introduction -- 2 Brief Literature Review -- 3 Materials - Initial Data Set Presentation -- 4 Methodology -- 4.1 Data Pre-processing -- 4.2 Classification Process -- 4.3 Validation Process -- 5 Results -- 5.1 Pre-processing Results -- 5.2 Classification Results -- 5.3 Validation Results -- 6 Conclusion -- References -- Fuzzy Clustering SMOTE and Fuzzy Classifiers for Hidden Disease Predictions -- 1 Introduction -- 2 Fuzzy-C-Means SMOTE -- 3 Fuzzy Classifiers -- 3.1 Fuzzy KNN -- 3.2 Fuzzy Decision Tree -- 4 Experiments -- 4.1 Datasets -- 4.2 Metrics -- 4.3 Visualization of the Synthetic Samples -- 4.4 Comparison Results -- 4.5 Ranking -- 5 Conclusion -- References -- Digitization of Forensic Engineering: Overview, Perspectives and New Challenges -- 1 Introduction -- 2 Preliminaries -- 2.1 Digitization Procedure -- 2.2 Forensic Science -- 2.3 Digital Forensics -- 2.4 Digital Structural Forensics -- 3 The Digital Forensics Process -- 3.1 Collection -- 3.2 Examination -- 3.3 Analysis -- 4 Discussion and Current Limitations -- 5 Future Research Directions -- 6 Conclusive Considerations -- References -- Supporting the Maintenance Process of Healthcare Pervasive Devices -- 1 Introduction -- 2 Motivation -- 3 Background and Related Work -- 4 The COSYMA Project -- 4.1 Smart Maintenance -- 5 The Overall Architecture -- 6 Technical Discussion -- 6.1 The Data Monitoring and Collection -- 6.2 Model-Driven Methods -- 6.3 Data-Driven Methods -- 6.4 Innovative Instruments for Maintenance -- 7 Conclusions and Open Challenges -- References. | |
Integrating OpenAI Chat-GPT in a University Department of Education: Main Types of Use and Preliminary Assessment Results -- 1 Introduction -- 2 Related Work -- 2.1 AI in Education -- 2.2 Internet Tools in Education -- 3 Chat-GPT Uses in a University Department -- 3.1 General Uses of Chat-GPT -- 3.2 Uses of Chat-GPT Involving Students -- 3.3 Uses of Chat-GPT Involving Tutors -- 3.4 Uses of Chat-GPT for Specific Types of Students -- 3.5 Uses of Chat-GPT in Distance Learning -- 4 Examples of Queries to Chat-GPT and Indicative Replies -- 5 Research Study in Progress About Chat-GPT -- 6 Discussion and Analysis of Preliminary Results -- 7 Conclusions -- References -- TravelTheLake: Promoting Sustainable Lake Development Using Augmented Reality -- 1 Introduction -- 2 Related Work -- 3 AR-Based Application -- 4 Implementation of the Application -- 4.1 Navigation Step by Step -- 4.2 Implementation Details -- 5 Evaluation Setup and Task Description -- 5.1 Results of Usability Assessment -- 5.2 Assessment of the Value of the Application in Real Aspects of Life -- 5.3 Suggestions for Improvements -- 6 Conclusions/Future Work -- References -- Few-Shot 1/a Anomalies Feedback: Damage Vision Mining Opportunity and Embedding Feature Imbalance -- 1 Introduction -- 1.1 Related Works for Imbalanced Vision Data -- 1.2 Imbalanced Anomaly Detection Application for Damage Vision Inspection -- 2 Imbalanced Anomaly Detection Application -- 2.1 One-Class Classification Using Deeper FCDDs -- 2.2 Damage-Mark Heatmap Upsampling -- 3 Applied Results -- 3.1 Class Imbalanced Vision Data -- 3.2 Blood Infection -- 3.3 Lung Infection -- 3.4 Driving Distraction -- 3.5 Wooden Deterioration -- 3.6 Concrete Crack -- 3.7 River Sludge -- 3.8 Disaster Damage -- 3.9 Hurricane Damage -- 4 Concluding Remarks -- 4.1 Anomaly Detection for Class Imbalance. | |
4.2 Limitation and Robustness for Unseen Damage -- References -- Traffic Congestion Prediction: A Machine Learning Approach -- 1 Introduction -- 2 Background -- 2.1 Smart Cities -- 2.2 Traffic Data Sources -- 2.3 Traffic Models -- 2.4 Evaluation Metrics -- 2.5 Traffic Prediction Related Work -- 3 Methodology -- 3.1 Data Collection and Engineering -- 3.2 Univariable Approach -- 3.3 High Correlated Crosses Approach -- 3.4 Multivariable Approach -- 4 Results -- 4.1 Univariable Approach -- 4.2 High Correlated Crosses Approach -- 4.3 Multivariable Approach -- 5 Conclusion -- 5.1 Discussion -- 5.2 Threats to Validity -- 5.3 Future Work -- References -- Software Defect Detection Using Machine Learning on Data from Open-Source Programs -- 1 Introduction -- 2 Background -- 2.1 Data Mining Techniques for Software Defect Detection -- 3 Methodology -- 3.1 Research Questions -- 3.2 Data Preparation -- 3.3 Modelling -- 4 Results -- 4.1 Results of the Notepad++ dataset -- 4.2 Results of the JuCi++ dataset -- 5 Discussion -- 6 Conclusions -- 7 Future Work -- References -- Author Index. | |
Titolo autorizzato: | Extended Selected Papers of the 14th International Conference on Information, Intelligence, Systems, and Applications |
ISBN: | 3-031-67426-X |
Formato: | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione: | Inglese |
Record Nr.: | 9910879585203321 |
Lo trovi qui: | Univ. Federico II |
Opac: | Controlla la disponibilità qui |