• A
  • A
  • A
  • ABC
  • ABC
  • ABC
  • А
  • А
  • А
  • А
  • А
Regular version of the site
Of all publications in the section: 740
Sort:
by name
by year
Book
Savchenko A. Switzerland: Springer, 2016.

A unified methodology for categorizing various complex objects is presented in this book. Through probability theory, novel asymptotically minimax criteria suitable for practical applications in imaging and data analysis are examined including the special cases such as the Jensen-Shannon divergence and the probabilistic neural network. An optimal approximate nearest neighbor search algorithm, which allows faster classification of databases is featured. Rough set theory, sequential analysis and granular computing are used to improve performance of the hierarchical classifiers. Practical examples in face identification (including deep neural networks), isolated commands recognition in voice control system and classification of visemes captured by the Kinect depth camera are included. This approach creates fast and accurate search procedures by using exact probability densities of applied dissimilarity measures.

This book can be used as a guide for independent study and as supplementary material for a technically oriented graduate course in intelligent systems and data mining. Students and researchers interested in the theoretical and practical aspects of intelligent classification systems will find answers to:

- Why conventional implementation of the naive Bayesian approach does not work well in image classification?

- How to deal with insufficient performance of hierarchical classification systems?

 

- Is it possible to prevent an exhaustive search of the nearest neighbor in a database?

Added: Apr 12, 2016
Book
Edited by: M. Akhin, В. М. Ицыксон, Б. Новиков et al. St. Petersburg: ООО "Цифровая фабрика "Быстрый Цвет", 2017.

The Second Conference on Software Engineering and Information Management (SEIM-2017) aims to bring together students, researchers and practitioners in different areas of software engineering and information management. We consider SEIM-2017 to be a stepping stone for young researchers, which should help them familiarize with the conference workflow, practice writing academic papers, gather valuable feedback about their research and expand their research network. The conference welcomes submissions on a wide range of topics, including but not limited to: • Algorithms and data structures • Cloud systems • Coding theory • Compilers • Crowdsourcing • Data storage and processing • Development management • Digital signal processing • Distributed systems • E-commerce / e-government • Empirical software engineering • High-performance computing • Information retrieval • Information security • Intelligent data analysis • Internet of Things • Machine learning • Mobile systems • Modelling • Natural language processing • Networks and telecommunications • (Non-)relational databases • Operating systems • Programming languages • Recommendation systems • Robotics • Semantic web • Social networks • Software analysis • Software testing • Software verification • Software virtualization • Software-defined networks • Theoretical computer science In total, we received 35 papers, each reviewed by at least 3 members of the Program Committee, of which 8 were selected for publication in CEUR-WS.org, 8 — for indexing in RSCI, and 4 were accepted as talk-only to allow the young authors to experience the process of a scientific conference. We would like to thank the members of our Program Committee for their great work and contribution to the success of our conference!

These proceedings include the SEIM-2017 papers, which were selected by the Program Committee for publication in RSCI. These papers passed not only the original review procedure, but also an additional round of post-review with the conference feedback. We thank the authors for their submissions to SEIM 2017 and hope to see them in the future! Furthermore, we would also like to thank Tatiana Mironova and Sergey Zherevchuk for their great help in organizing the conference, Computer Science Center for hosting the event, and JetBrains Research for their overall support of this endeavour! The additional information about the SEIM conference series can be found on the conference website at: http://2017. seim-conf.org/

Added: Nov 9, 2018
Book
Zykov S. V., Gromoff A., Kazantsev N. Hershey: IGI Global, 2019.

Sustaining a competitive edge in today’s business world requires innovative approaches to product, service, and management systems design and performance. Advances in computing technologies have presented managers with additional challenges as well as further opportunities to enhance their business models.

Software Engineering for Enterprise System Agility: Emerging Research and Opportunities is a collection of innovative research that identifies the critical technological and management factors in ensuring the agility of business systems and investigates process improvement and optimization through software development. Featuring coverage on a broad range of topics such as business architecture, cloud computing, and agility patterns, this publication is ideally designed for business managers, business professionals, software developers, academicians, researchers, and upper-level students interested in current research on strategies for improving the flexibility and agility of businesses and their systems.

Added: Mar 21, 2018
Book
Rutskiy V. Vol. 1294. Springer, 2020.

This book constitutes the refereed proceedings of the 4th Computational Methods in Systems and Software 2020 (CoMeSySo 2020) proceedings. Software engineering, computer science and artificial intelligence are crucial topics for the research within an intelligent systems problem domain. The CoMeSySo 2020 conference is breaking the barriers, being held online. CoMeSySo 2020 intends to provide an international forum for the discussion of the latest high-quality research results.

Added: Oct 11, 2021
Book
Kalyagin V. A., Koldanov A. P., Koldanov P. et al. Springer, 2020.

This book studies complex systems with elements represented by random variables. Its main goal is to study and compare uncertainty of algorithms of network structure identification with applications to market network analysis. For this, a mathematical model of random variable network is introduced, uncertainty of identification procedure is defined through a risk function, random variables networks with different measures of similarity (dependence) are discussed, and general statistical properties of identification algorithms are studied. The volume also introduces a new class of identification algorithms based on a new measure of similarity and prove its robustness in a large class of distributions, and presents applications to social networks, power transmission grids, telecommunication networks, stock market networks, and brain networks through a theoretical analysis that identifies network structures. Both researchers and graduate students in computer science, mathematics, and optimization will find the applications and techniques presented useful.

 

Added: Sep 10, 2020
Book
Vol. 1197: Supplementary Proceedings of AIST 2014. Ekaterinburg: CEUR Workshop Proceedings, 2014.

AIST'2014 is an international data science conference on Analysis of Images, Social Networks, and Texts. Traditionally, the conference is held annually in Yekaterinburg, Russia. The conference is intended for computer scientists and practitioners whose research interests involve Internet mathematics and other related fields of data science.

LIST OF TOPICS (NON EXHAUSTIVE)

Applications of Data Mining and Machine Learning techniques to Analysis of images and video Natural Language Processing Social Network Analysis Recommender systems and collaborative technologies Geoinformation systems Game analytics Information Retrieval Core Data Mining and Machine Learning techniques Sematic Web and Ontologies Data Mining in social sciences and economics Computational econometrics Experimental Economics Educational Data Mining
Added: Aug 28, 2014
Book
Edited by: D. I. Ignatov. Vol. 1710. Aachen: CEUR Workshop Proceedings, 2016.

AIST is a scientific conference on Analysis of Images, Social Networks, and Texts. The conference is intended for computer scientists and practitioners whose research interests involve Internet mathematics and other related fields of data science. Similar to the previous year, the conference will be focused on applications of data mining and machine learning techniques to various problem domains: image processing, analysis of social networks, and natural language processing. We hope that the participants will benefit from the interdisciplinary nature of the conference and exchange experience.

Added: Aug 27, 2016
Book
Vol. 1975. Aachen: CEUR-WS.org, 2017.

AIST is a scientific conference on Analysis of Images, Social Networks, and Texts. The conference is intended for computer scientists and practitioners whose research interests involve Internet mathematics and other related fields of data science. Similar to the previous year, the conference will be focused on applications of data mining and machine learning techniques to various problem domains: image processing, analysis of social networks, and natural language processing. We hope that the participants will benefit from the interdisciplinary nature of the conference and exchange experience.

Added: Jun 24, 2017
Book
IEEE, 2019.

ICUMT is an IEEE premier an annual international congress providing an open forum for researchers, engineers, network planners and service providers targeted on newly emerging algorithms, systems, standards, services, and applications, bringing together leading international players in telecommunications, control systems, automation and robotics. The event is positioned as a major international annual congress for the presentation of original results achieved from fundamental as well as applied research and engineering works.

Added: Oct 27, 2019
Book
Bernstein A., Burnaev E. V., Шараев М. et al. Society of Photo-Optical Instrumentation Engineers, 2020.

The paper will provide examples of computer vision tasks in which topological data analysis gave new effective solutions. Ideas underlying topological data analysis and its basic methods will be briefly described and illustrated with examples of computer vision problems. No prior knowledge in topological data analysis and computational geometry is assumed, a brief introduction to subject is given throughout the text.

Added: Oct 14, 2021
Book
Kachan O., Onuchin A. IEEE, 2021.

The increasing use of eye tracking in modern cognitive and clinical psychology, neuroscience, and ophthalmology requires new methods of objective quantitative analysis of complex eye movement data. In the current work, topological data analysis (TDA) is used to extract a new type of features of eye movements to differentiate between two eye movements groups, obtained upon the presentation of two different stimuli images - a human face, shown straight and rotated for 180 degrees, which corresponds to the processing of the normal and unusual visual information respectively. Experimental evidence shows that the proposed topology-based features have more discriminative power over the generally accepted features of eye movements, allowing to separate provided different stimuli with good accuracy. Moreover, the concatenation of the topology-based and ROI fixation ratios features further improves the performance of the classification task, showing the complementariness of the proposed topological features to the existing ones. We believe that the new class of features is able to serve as a valuable addition to the eye movement data-based medical diagnosis of mental, neurological, and ophthalmological disorders and diseases.

Added: Oct 14, 2021
Book
Sablin I., Kuchinskiy A., Korobeinikov A. et al. Heidelberg: HeiDATA: Heidelberg Research Data Repository, University of Heidelberg, 2015.

The geographic information system (GIS) is based on the first and only Russian Imperial Census of 1897 and the First All-Union Census of the Soviet Union of 1926. The GIS features vector data (shapefiles) of allprovinces of the two states. For the 1897 census, there is information about linguistic, religious, and social estate groups. The part based on the 1926 census features nationality. Both shapefiles include information on gender, rural and urban population. The GIS allows for producing any necessary maps for individual studies of the period which require the administrative boundaries and demographic information.

Added: Dec 8, 2015
Book
Pozin B. Vol. 30. Iss. 1. Институт системного программирования РАН, 2018.

The set of outline and guidelines as well as tools for automation to ensure continuity of business-continuity in the lifecycle of mission critical systems are considered. This complex is called the Life Cycle Supporting System (LCSS). The aim of the system is to reduce the risk level of the realization of critical errors in the system and application software throughout the life cycle of mission critical system, reducing operational risks and total cost of ownership of mission critical system. LCSS in the ISO / IEC / IEEE 15288 terms is enabling system. LCSS is created for life cycle of mission critical system support in the organization-owner.

Added: Oct 30, 2018
Book
NY: InTech, 2011.

The aim of this book is to give a treatment of the actively developed domain of Ubiquitous computing. Originally proposed by Mark D. Weiser, the concept of Ubiquitous computing enables a real-time global sensing, context-aware informational retrieval, multi-modal interaction with the user and enhanced visualization capabilities. In effect, Ubiquitous computing environments give extremely new and futuristic abilities to look at and interact with our habitat at any time and from anywhere. In that domain, researchers are confronted with many foundational, technological and engineering issues which were not known before. Detailed cross-disciplinary coverage of these issues is really needed today for further progress and widening of application range. This book collects twelve original works of researchers from eleven countries, which are clustered into four sections: Foundations, Security and Privacy, Integration and Middleware, Practical Applications.

Added: Apr 22, 2013
Book
Belenky A. Heidelberg; NY; Dordrecht; L.: Springer, 2012.

This is the first book on the U.S. presidential election system to analyze the basic principles underlying the design of the existing system and those at the heart of competing proposals for improving the system. The book discusses how the use of some election rules embedded in the U.S. Constitution and in the Presidential Succession Act may cause skewed or weird election outcomes and election stalemates. The book argues that the act may not cover some rare though possible situations which the Twentieth Amendment authorizes Congress to address. Also, the book questions the constitutionality of the National Popular Vote Plan to introduce a direct popular presidential election de facto, without amending the Constitution, and addresses the plan’s “Achilles’ Heel.”  In particular, the book shows that the plan may violate the Equal Protection Clause from the Fourteenth Amendment of the Constitution. Numerical examples are provided to show that the counterintuitive claims of the NPV originators and proponents that the plan will encourage presidential candidates to “chase” every vote in every state do not have any grounds. Finally, the book proposes a plan for improving the election system by combining at the national level the “one state, one vote” principle – embedded in the Constitution – and the “one person, one vote” principle. Under this plan no state loses its current Electoral College benefits while all the states gain more attention of presidential candidates.

Added: Sep 25, 2012
Book
Макеффри М. М.: Эксмо, 2019.
Added: May 16, 2019
Book
Edited by: V. A. Fomichov, O. S. Fomichova. Iss. 36. Ljubljana: Slovene Society Informatica, 2012.

The authors of the papers from Croatia, Italy, Mexico, Poland, Romania, and Russia look for constructive ways of contributing to harmonic development of the personality in modern information society. The common feature of the papers is that they either relate to the new scientific discipline called Cognitonics or correspond to its goals.    Cognitonics emerged in the first half of the 2000s. It   aims (a) at explicating the distortions in the perception of the world caused by the information and communication technologies and globalization and (b) at coping with these distortions in different fields by means of elaborating systemic solutions for compensating the negative implications of the kind for the personality and society, in particular, for creating cognitive-cultural preconditions of the harmonic development of the personality in the information society and for ensuring the successful development of national cultures and national languages.

Added: Dec 13, 2012
Book
Rudchenko A., Sheridan T., Yufik Y. Vancouver: IEEE, 1995.
Added: May 30, 2013
Book
Afanasiev V. M.: Грифон, 2015.

The problem of optimal control for a class of nonlinear objects with uncontrolled bounded disturbances is formulated in the key of differential game. For problems with a quadratic quality functional task of searching for the optimal control reduces the need to find solutions to the scalar partial differential equation Hamilton-Jacobi-Isaacs. Finding solutions to this equation in the operation rate of the object by means of special algorithmic procedures obtained by using the theory of viscous solutions. The results can be used to solve theoretical and practical problems that occur in mathematics, mechanics, physics, biology, chemistry, engineering sciences, control and navigation.

Added: Apr 13, 2015