Browse Results

Showing 27,676 through 27,700 of 53,539 results

Frontier and Future Development of Information Technology in Medicine and Education

by Shaozi Li Qun Jin Xiaohong Jiang James J. Jong Hyuk Park

IT changes everyday's life, especially in education and medicine. The goal of ITME 2013 is to further explore the theoretical and practical issues of IT in education and medicine. It also aims to foster new ideas and collaboration between researchers and practitioners.

Machine Learning for Causal Inference

by Sheng Li Zhixuan Chu

This book provides a deep understanding of the relationship between machine learning and causal inference. It covers a broad range of topics, starting with the preliminary foundations of causal inference, which include basic definitions, illustrative examples, and assumptions. It then delves into the different types of classical causal inference methods, such as matching, weighting, tree-based models, and more. Additionally, the book explores how machine learning can be used for causal effect estimation based on representation learning and graph learning. The contribution of causal inference in creating trustworthy machine learning systems to accomplish diversity, non-discrimination and fairness, transparency and explainability, generalization and robustness, and more is also discussed. The book also provides practical applications of causal inference in various domains such as natural language processing, recommender systems, computer vision, time series forecasting, and continual learning. Each chapter of the book is written by leading researchers in their respective fields. Machine Learning for Causal Inference explores the challenges associated with the relationship between machine learning and causal inference, such as biased estimates of causal effects, untrustworthy models, and complicated applications in other artificial intelligence domains. However, it also presents potential solutions to these issues. The book is a valuable resource for researchers, teachers, practitioners, and students interested in these fields. It provides insights into how combining machine learning and causal inference can improve the system's capability to accomplish causal artificial intelligence based on data. The book showcases promising research directions and emphasizes the importance of understanding the causal relationship to construct different machine-learning models from data.

Robust Representation for Data Analytics

by Sheng Li Yun Fu

This book introduces the concepts and models of robust representation learning, and provides a set of solutions to deal with real-world data analytics tasks, such as clustering, classification, time series modeling, outlier detection, collaborative filtering, community detection, etc. Three types of robust feature representations are developed, which extend the understanding of graph, subspace, and dictionary. Leveraging the theory of low-rank and sparse modeling, the authors develop robust feature representations under various learning paradigms, including unsupervised learning, supervised learning, semi-supervised learning, multi-view learning, transfer learning, and deep learning. Robust Representations for Data Analytics covers a wide range of applications in the research fields of big data, human-centered computing, pattern recognition, digital marketing, web mining, and computer vision.

Advances in Image and Graphics Technologies: 11th Chinese Conference, IGTA 2016, Beijing, China, July 8-9, 2016, Proceedings (Communications in Computer and Information Science #634)

by Sheng Li Ran He Tieniu Tan Guoping Wang Shengjin Wang Yue Liu Xiaoru Yuan

This book constitutes the refereed proceedings of the Chinese Conference on Image and Graphics Technologies and Applications, IGTA 2013, held in Beijing, China, in April 2013. The 40 papers and posters presented were carefully reviewed and selected from 89 submissions. The papers address issues such as the generation of new ideas, new approaches, new techniques, new applications and new evaluation in the field of image processing and graphics.

Chinese Computational Linguistics: 20th China National Conference, CCL 2021, Hohhot, China, August 13–15, 2021, Proceedings (Lecture Notes in Computer Science #12869)

by Sheng Li Maosong Sun Yang Liu Hua Wu Liu Kang Wanxiang Che Shizhu He Gaoqi Rao

This book constitutes the proceedings of the 20th China National Conference on Computational Linguistics, CCL 2021, held in Hohhot, China, in August 2021.The 31 full presented in this volume were carefully reviewed and selected from 90 submissions. The conference papers covers the following topics such as Machine Translation and Multilingual Information Processing, Minority Language Information Processing, Social Computing and Sentiment Analysis, Text Generation and Summarization, Information Retrieval, Dialogue and Question Answering, Linguistics and Cognitive Science, Language Resource and Evaluation, Knowledge Graph and Information Extraction, and NLP Applications.

Green, Pervasive, and Cloud Computing: 13th International Conference, GPC 2018, Hangzhou, China, May 11-13, 2018, Revised Selected Papers (Lecture Notes in Computer Science #11204)

by Shijian Li

This book constitutes the proceedings of the 13th International Conference on Green, Pervasive, and Cloud Computing, GPC 2018, held in Hangzhou, China, in May 2018.The 35 full papers included in this volume were carefully reviewed and selected from 101 initial submissions. They are organized in the following topical sections: network security, and privacy-preserving; pervasive sensing and analysis; cloud computing, mobile computing, and crowd sensing; social and urban computing; parallel and distributed systems, optimization; pervasive applications; and data mining and knowledge mining.

Competition-Based Neural Networks with Robotic Applications (SpringerBriefs in Applied Sciences and Technology)

by Shuai Li Long Jin

Focused on solving competition-based problems, this book designs, proposes, develops, analyzes and simulates various neural network models depicted in centralized and distributed manners. Specifically, it defines four different classes of centralized models for investigating the resultant competition in a group of multiple agents. With regard to distributed competition with limited communication among agents, the book presents the first distributed WTA (Winners Take All) protocol, which it subsequently extends to the distributed coordination control of multiple robots. Illustrations, tables, and various simulative examples, as well as a healthy mix of plain and professional language, are used to explain the concepts and complex principles involved. Thus, the book provides readers in neurocomputing and robotics with a deeper understanding of the neural network approach to competition-based problem-solving, offers them an accessible introduction to modeling technology and the distributed coordination control of redundant robots, and equips them to use these technologies and approaches to solve concrete scientific and engineering problems.

Machine Behavior Design And Analysis: A Consensus Perspective

by Shuai Li Yinyan Zhang

In this book, we present our systematic investigations into consensus in multi-agent systems. We show the design and analysis of various types of consensus protocols from a multi-agent perspective with a focus on min-consensus and its variants. We also discuss second-order and high-order min-consensus. A very interesting topic regarding the link between consensus and path planning is also included. We show that a biased min-consensus protocol can lead to the path planning phenomenon, which means that the complexity of shortest path planning can emerge from a perturbed version of min-consensus protocol, which as a case study may encourage researchers in the field of distributed control to rethink the nature of complexity and the distance between control and intelligence. We also illustrate the design and analysis of consensus protocols for nonlinear multi-agent systems derived from an optimal control formulation, which do not require solving a Hamilton-Jacobi-Bellman (HJB) equation. The book was written in a self-contained format. For each consensus protocol, the performance is verified through simulative examples and analyzed via mathematical derivations, using tools like graph theory and modern control theory. The book’s goal is to provide not only theoretical contributions but also explore underlying intuitions from a methodological perspective.

Learning Analytics Enhanced Online Learning Support

by Shuang Li

Offering the latest developments in online education in the era of big data, this book explores theories, technologies, and practices in the field of data-driven online learning support services using learning analytics. This book is divided into five chapters. Chapter 1 reflects and reconstructs the connotation of learning support against the backdrop of education reform, the rise of learning analytics, and the upgrading of the demand for learning services in the new era. Chapter 2 presents a P-K-DSE-E model of online learner characteristics and discusses measurement and data representation methods for learner characteristics based on it. Chapters 3–5 focus on the three types of learning support that are closely related to learning performance and satisfaction, including the promotion of social learning, electronic learning assessment based on the learning process, and personalized tutoring and support. This book innovatively develops the concept, theory, and practical methods of student support services in distance education traditional practices in the new era and provides valuable exploration of data-driven personalized learning service methods and technologies in the era of artificial intelligence through rich examples. This book will be essential reading for students and scholars of distance and online education, educational technology, and audiovisual education.

Trajectory Optimization and Guidance Methods for Mars Entry

by Shuang Li Xu Liu Xiu-qiang Jiang Yu-ming Peng

This book systematically investigates the Mars entry problem from the perspectives of deterministic optimization, uncertainty optimization, and guidance. Began with a detailed review of the robotic missions and human-scaled exploration plans to Mars, theories or concepts of optimal control, uncertainty quantification, robust optimization, model predictive control, sequential convex programming, and computational guidance are subsequently introduced. Correspondingly, this book presents a series of trajectory planning and guidance algorithms to improve the robustness, reliability, and safety of the Mars missions. Because the Mars entry problem is studied using advanced mathematics, including probability theory, optimization theory, and cybernetics, thus the book is primarily designed as a textbook for graduate students in aerospace engineering, aeronautics, and astronautics departments. Engineers and researchers may also use this book as a reference or tutorial to help with the modeling and simulation of the Mars entry problem due to its thorough simulations and analyses.

Network and System Security: 17th International Conference, NSS 2023, Canterbury, UK, August 14–16, 2023, Proceedings (Lecture Notes in Computer Science #13983)

by Shujun Li Mark Manulis Atsuko Miyaji

This book constitutes the refereed proceedings of the 17th International Conference on Network and System Security, NSS 2023, held in Canterbury, UK, August 14–16, 2023.The 12 full and 9 short papers presented together with 2 invited talks in this book were carefully reviewed and selected from 64 submissions. They focus on Attacks and Malware, Blockchain, Security through Hardware, Machine learning and much more.

Statistical Atlases and Computational Models of the Heart. Multi-Sequence CMR Segmentation, CRT-EPiggy and LV Full Quantification Challenges: 10th International Workshop, STACOM 2019, Held in Conjunction with MICCAI 2019, Shenzhen, China, October 13, 2019, Revised Selected Papers (Lecture Notes in Computer Science #12009)

by Shuo Li Oscar Camara Tommaso Mansi Mihaela Pop Maxime Sermesant Alistair Young Xiahai Zhuang Avan Suinesiaputra

This book constitutes the thoroughly refereed post-workshop proceedings of the 10th International Workshop on Statistical Atlases and Computational Models of the Heart: Atrial Segmentation and LV Quantification Challenges, STACOM 2019, held in conjunction with MICCAI 2019, in Shenzhen, China, in October 2019. The 42 revised full workshop papers were carefully reviewed and selected from 76 submissions. The topics of the workshop included: cardiac imaging and image processing, machine learning applied to cardiac imaging and image analysis, atlas construction, statistical modelling of cardiac function across different patient populations, cardiac computational physiology, model customization, atlas based functional analysis, ontological schemata for data and results, integrated functional and structural analyses, as well as the pre-clinical and clinical applicability of these methods.

Computational Methods and Data Analysis for Metabolomics (Methods in Molecular Biology #2104)

by Shuzhao Li

This book provides a comprehensive guide to scientists, engineers, and students that employ metabolomics in their work, with an emphasis on the understanding and interpretation of the data. Chapters guide readers through common tools for data processing, using database resources, major techniques in data analysis, and integration with other data types and specific scientific domains. Written in the highly successful Methods in Molecular Biology series format, chapters include introductions to their respective topics, practical guidance of methods and techniques, useful web supplements, and connect the steps from experimental metabolomics to scientific discoveries. Authoritative and cutting-edge, Computational Methods and Data Analysis for Metabolomics to ensure successful results in the further study of this vital field.

Professional Apache Tomcat 6

by Sing Li Vivek Chopra Jeff Genender

Tomcat is the official reference implementation of Sun's servlet and JSP specifications, and Java developers must test all Web applications on Tomcat to ensure they work as designedBoasting more than 40 percent new and updated material, this book covers all the major new features affecting server administration and managementExplores the additional built-in tools of Tomcat, which help Java developers program more efficiently, and looks at how Apache's other open source servlet/JSP technologies are designed to work with TomcatFeatures full coverage of Release 6, which supports the latest JSP and servlet specifications: JSP 2.1 and Servlets 2.5Addresses solving real-world problems encountered during all phases of server administration, including managing class loaders and connectors, security, shared hosting and clustering, and system testing

Handbook of Face Recognition

by Stan Z. Li Anil K. Jain

This highly anticipated new edition provides a comprehensive account of face recognition research and technology, spanning the full range of topics needed for designing operational face recognition systems. After a thorough introductory chapter, each of the following chapters focus on a specific topic, reviewing background information, up-to-date techniques, and recent results, as well as offering challenges and future directions. Features: fully updated, revised and expanded, covering the entire spectrum of concepts, methods, and algorithms for automated face detection and recognition systems; provides comprehensive coverage of face detection, tracking, alignment, feature extraction, and recognition technologies, and issues in evaluation, systems, security, and applications; contains numerous step-by-step algorithms; describes a broad range of applications; presents contributions from an international selection of experts; integrates numerous supporting graphs, tables, charts, and performance data.

Handbook of Face Recognition

by Stan Z. Li Anil K. Jain Jiankang Deng

The history of computer-aided face recognition dates to the 1960s, yet the problem of automatic face recognition – a task that humans perform routinely and effortlessly in our daily lives – still poses great challenges, especially in unconstrained conditions.This highly anticipated new edition provides a comprehensive account of face recognition research and technology, spanning the full range of topics needed for designing operational recognition systems. After a thorough introduction, each subsequent chapter focuses on a specific topic, reviewing background information, up-to-date techniques, and recent results, as well as offering challenges and future directions.Topics and features:Fully updated, revised, and expanded, covering the entire spectrum of concepts, methods, and algorithms for automated detection and recognition systemsProvides comprehensive coverage of face detection, alignment, feature extraction, and recognition technologies, and issues in evaluation, systems, security, and applicationsContains numerous step-by-step algorithmsDescribes a broad range of applications from person verification, surveillance, and security, to entertainmentPresents contributions from an international selection of preeminent expertsIntegrates numerous supporting graphs, tables, charts, and performance dataThis practical and authoritative reference is an essential resource for researchers, professionals and students involved in image processing, computer vision, biometrics, security, Internet, mobile devices, human-computer interface, E-services, computer graphics and animation, and the computer game industry.

3D TCAD Simulation for Semiconductor Processes, Devices and Optoelectronics

by Suihua Li Simon Li

Technology computer-aided design, or TCAD, is critical to today's semiconductor technology and anybody working in this industry needs to know something about TCAD. This book is about how to use computer software to manufacture and test virtually semiconductor devices in 3D. It brings to life the topic of semiconductor device physics, with a hands-on, tutorial approach that de-emphasizes abstract physics and equations and emphasizes real practice and extensive illustrations. Coverage includes a comprehensive library of devices, representing the state of the art technology, such as SuperJunction LDMOS, GaN LED devices, etc.

Big Data: 10th CCF Conference, BigData 2022, Chengdu, China, November 18–20, 2022, Proceedings (Communications in Computer and Information Science #1709)

by Tianrui Li Rui Mao Guoyin Wang Fei Teng Lei Zhang Li Wang Laizhong Cui Jie Hu

This book constitutes the refereed proceedings of the 10th CCF Conference on BigData 2022, which took place in Chengdu, China, in November 2022. The 8 full papers presented in this volume were carefully reviewed and selected from 28 submissions. The topics of accepted papers include theories and methods of data science, algorithms and applications of big data.

Live-Line Operation and Maintenance of Power Distribution Networks

by Tianyou Li Qiujin Lin Genghuang Chen

Excellent reference outlining the technical basis and working principles of live-line working, with current application technology, tools and working methods Introduces live-line working technology for the operation and maintenance of medium and low voltage power distribution networks, covering both the methods and techniques of live-line working on distribution networks with O&M field practices and experiences Elaborates the technical basis and working principles of live-line working in detail, with current application technology, tools and working methods Combining theory and practice closely, it provides technical guidance and helpful references to technical personnel who are engaged in distribution operation management, as well as related academics and researchers Written by a team of authors with extensive experience in both industry and academic fields, providing first-hand testimony of the issues facing electricity distribution companies, and offering sound theoretical foundations and rich field experiences

Wireless Communications under Hostile Jamming: Security and Efficiency

by Tongtong Li Tianlong Song Yuan Liang

This monograph is intended for the designers and would-be designers of secure and efficient wireless communication systems under intentional interference. Along with the widespread of wireless devices, especially reconfigurable software defined radios, jamming has become a serious threat to civilian communications. In this book, going beyond traditional communication system design that mainly focuses on accurate information transmission under benign environments, we aim to enhance the physical layer security of communication systems by integrating modern cryptographic techniques into transceiver design, so as to achieve secure high-speed transmission under hostile interference with high reliability and efficiency. We revisit existing jamming patterns, and introduce new jamming patterns. We analyze the weaknesses of existing anti-jamming techniques. We present innovative and feasible anti-jamming techniques, which can strengthen the inherent security of the 3G, 4G and the upcoming 5G systems with minimal and inexpensive changes to the existing CDMA, frequency hopping and OFDM schemes. We also provide benchmarks for system performance evaluation under various jamming scenarios through capacity analysis. This book includes design principles, in-depth theoretical analysis and practical design examples, and will be of interest to academic researchers as well as professionals in industry.

Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities

by Vickie Li

Bug Bounty Bootcamp teaches you how to hack web applications. You will learn how to perform reconnaissance on a target, how to identify vulnerabilities, and how to exploit them. You&’ll also learn how to navigate bug bounty programs set up by companies to reward security professionals for finding bugs in their web applications.Bug bounty programs are company-sponsored programs that invite researchers to search for vulnerabilities on their applications and reward them for their findings. This book is designed to help beginners with little to no security experience learn web hacking, find bugs, and stay competitive in this booming and lucrative industry. You&’ll start by learning how to choose a program, write quality bug reports, and maintain professional relationships in the industry. Then you&’ll learn how to set up a web hacking lab and use a proxy to capture traffic. In Part 3 of the book, you&’ll explore the mechanisms of common web vulnerabilities, like XSS, SQL injection, and template injection, and receive detailed advice on how to find them and bypass common protections. You&’ll also learn how to chain multiple bugs to maximize the impact of your vulnerabilities. Finally, the book touches on advanced techniques rarely covered in introductory hacking books but that are crucial to understand to hack web applications. You&’ll learn how to hack mobile apps, review an application&’s source code for security issues, find vulnerabilities in APIs, and automate your hacking process. By the end of the book, you&’ll have learned the tools and techniques necessary to be a competent web hacker and find bugs on a bug bounty program.

Machine Learning in Medical Imaging: 7th International Workshop, MLMI 2016, Held in Conjunction with MICCAI 2016, Athens, Greece, October 17, 2016, Proceedings (Lecture Notes in Computer Science #10019)

by Li Wang, Ehsan Adeli, Qian Wang, Yinghuan Shi and Heung-Il Suk

This book constitutes the refereed proceedings of the 7th International Workshop on Machine Learning in Medical Imaging, MLMI 2016, held in conjunction with MICCAI 2016, in Athens, Greece, in October 2016. The 38 full papers presented in this volume were carefully reviewed and selected from 60 submissions. The main aim of this workshop is to help advance scientific research within the broad field of machine learning in medical imaging. The workshop focuses on major trends and challenges in this area, and presents works aimed to identify new cutting-edge techniques and their use in medical imaging.

Crowdsourcing: Cloud-Based Software Development (Progress in IS)

by Wei Li Michael N. Huhns Wei-Tek Tsai Wenjun Wu

This book presents the latest research on the software crowdsourcing approach to develop large and complex software in a cloud-based platform. It develops the fundamental principles, management organization and processes, and a cloud-based infrastructure to support this new software development approach. The book examines a variety of issues in software crowdsourcing processes, including software quality, costs, diversity of solutions, and the competitive nature of crowdsourcing processes. Furthermore, the book outlines a research roadmap of this emerging field, including all the key technology and management issues for the foreseeable future. Crowdsourcing, as demonstrated by Wikipedia and Facebook for online web applications, has shown promising results for a variety of applications, including healthcare, business, gold mining exploration, education, and software development. Software crowdsourcing is emerging as a promising solution to designing, developing and maintaining software. Preliminary software crowdsourcing practices and platforms, including Apple's App Store and TopCoder, demonstrate the advantages of crowdsourcing in terms of software ecosystem expansion and product quality improvement.

R-Calculus, V: Description Logics (Perspectives in Formal Induction, Revision and Evolution)

by Wei Li Yuefei Sui

This book series consists of two parts, decidable description logics and undecidable description logics. It gives the R-calculi for description logics. This book offers a rich blend of theory and practice. It is suitable for students, researchers and practitioners in the field of logic.

Data Driven Smart Manufacturing Technologies and Applications (Springer Series in Advanced Manufacturing)

by Weidong Li Yuchen Liang Sheng Wang

This book reports innovative deep learning and big data analytics technologies for smart manufacturing applications. In this book, theoretical foundations, as well as the state-of-the-art and practical implementations for the relevant technologies, are covered. This book details the relevant applied research conducted by the authors in some important manufacturing applications, including intelligent prognosis on manufacturing processes, sustainable manufacturing and human-robot cooperation. Industrial case studies included in this book illustrate the design details of the algorithms and methodologies for the applications, in a bid to provide useful references to readers. Smart manufacturing aims to take advantage of advanced information and artificial intelligent technologies to enable flexibility in physical manufacturing processes to address increasingly dynamic markets. In recent years, the development of innovative deep learning and big data analytics algorithms is dramatic. Meanwhile, the algorithms and technologies have been widely applied to facilitate various manufacturing applications. It is essential to make a timely update on this subject considering its importance and rapid progress. This book offers a valuable resource for researchers in the smart manufacturing communities, as well as practicing engineers and decision makers in industry and all those interested in smart manufacturing and Industry 4.0.

Refine Search

Showing 27,676 through 27,700 of 53,539 results