{"title":"Genetic Algorithms and Applications for Stock Trading Optimization","authors":"S. Dey, V. Kapoor","doi":"10.4018/978-1-7998-4105-0","DOIUrl":"https://doi.org/10.4018/978-1-7998-4105-0","url":null,"abstract":"","PeriodicalId":101845,"journal":{"name":"Advances in Computational Intelligence and Robotics","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123275712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of Direct and Indirect Human-Centered Design Techniques With Dyslexic Users","authors":"Dominik Hagelkruys, R. Motschnig","doi":"10.4018/978-1-5225-9069-9.CH001","DOIUrl":"https://doi.org/10.4018/978-1-5225-9069-9.CH001","url":null,"abstract":"Designing for people with special needs, especially cognitive and affective needs, can be challenging. Human-centered design (HCD), which inherently promotes user-inclusion and promises products that fit the users' needs, seems to be an optimal solution for such tasks. But can an HCD-approach be easily applied with special needs users? How much adaptation is necessary to perform classical HCD-techniques with users affected by certain difficulties? This chapter discusses the insights gathered and strategies adopted while applying human-centered design in the LITERACY-project, a project of the European Union aiming at improving social inclusion of youth and adults with dyslexia, by creating an interactive web-portal. Hopefully, this case study provides insight on and gives courage for inclusion of end-users even though—or particularly because—they have special needs.","PeriodicalId":101845,"journal":{"name":"Advances in Computational Intelligence and Robotics","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125864809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"System Design and Development","authors":"I. Moir, A. Seabridge","doi":"10.1002/9780470770931.CH11","DOIUrl":"https://doi.org/10.1002/9780470770931.CH11","url":null,"abstract":"This chapter presents the Socrates DigitalTM system's design and development process. It describes the four phases of design and development: understand, explore, materialize, and realize. The completion of these four phases results in a Socrates DigitalTM system that leverages artificial intelligence services. The artificial intelligence services include a natural language processor provided by several artificial intelligence service providers, including Apple, Microsoft, Google, IBM, and Amazon.","PeriodicalId":101845,"journal":{"name":"Advances in Computational Intelligence and Robotics","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123667986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Artificial Intelligence and Security Challenges in Emerging Networks","authors":"","doi":"10.4018/978-1-5225-7353-1","DOIUrl":"https://doi.org/10.4018/978-1-5225-7353-1","url":null,"abstract":"","PeriodicalId":101845,"journal":{"name":"Advances in Computational Intelligence and Robotics","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117215164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dialog Development Manager","authors":"","doi":"10.4018/978-1-7998-7955-8.ch009","DOIUrl":"https://doi.org/10.4018/978-1-7998-7955-8.ch009","url":null,"abstract":"This chapter shows how software development professionals use the provided flow charts and pseudo-code to create the Dialog Development Manager. Analysts then use the Dialog Development Manager to create the problem-specific knowledge needed by a natural language processor to support the conversation between Socrates DigitalTM and end users. The Dialog Development Manager guides the analysts through design and development of the Understand, Explore, Materialize, and Realize phases to create the conversational interface for Socrates DigitalTM.","PeriodicalId":101845,"journal":{"name":"Advances in Computational Intelligence and Robotics","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123585619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mekelleche Fatiha, H. Hafid, Ould bouamama Belkacem
{"title":"Security in Wireless Sensor Networks","authors":"Mekelleche Fatiha, H. Hafid, Ould bouamama Belkacem","doi":"10.4018/978-1-5225-7338-8.CH011","DOIUrl":"https://doi.org/10.4018/978-1-5225-7338-8.CH011","url":null,"abstract":"A wireless sensor network (WSN) is a special ad hoc network. It consists of a large number of sensors communicating with wireless links to monitor the real-world environment. They have limited energy, computational power, memory, and transmission range. They are widely used in different fields like military operations, environmental monitoring, and healthcare applications. However, the openness and hostility of the deployment space and the resources limitations make these networks vulnerable to several types of attacks and intrusions. So, the WSN security becomes a real challenge. Principally, the attacks in the network aim at damaging the smooth running of the legitimate nodes and cause a dysfunction of the network. Sybil attack is one of the perilous attacks which affects the WSN networks and poses threats to many security goals. This attack makes the sensor node into Sybil node and illegitimately takes and claims multiple identities.","PeriodicalId":101845,"journal":{"name":"Advances in Computational Intelligence and Robotics","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122638316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"“Think of the Children!”","authors":"Hsiu-Feng Wang","doi":"10.4018/978-1-5225-9069-9.CH014","DOIUrl":"https://doi.org/10.4018/978-1-5225-9069-9.CH014","url":null,"abstract":"This experiment examined children's visual aesthetics and learning motivation with regard to websites. It applied Berlyne's theory of aesthetic preference to these websites. The experiment explored the relations between visual complexity, visual aesthetics, learning motivation, and children's age, and their effect on websites. A total of 150 children between 10 and 12 years old were involved. The children were asked to rate websites of different levels of perceived visual complexity in terms of visual aesthetic and learning motivation. The results showed that the children preferred websites that displayed a medium level of perceived visual complexity to those that displayed a high or low level of perceived visual complexity. Thus, the results supported Berlyne's theory. However, when aesthetic preference was analyzed with respect to age-related differences, it was found that older children preferred a medium level of perceived visual complexity and younger children preferred a high level of perceived visual complexity.","PeriodicalId":101845,"journal":{"name":"Advances in Computational Intelligence and Robotics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129547826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using Genetic Algorithms to Develop Investment Strategies","authors":"","doi":"10.4018/978-1-7998-4105-0.ch011","DOIUrl":"https://doi.org/10.4018/978-1-7998-4105-0.ch011","url":null,"abstract":"Genetic algorithms (GAs) are a powerful search technique. The use of genetic algorithms (GAs) will help in the development of better trading systems. The genetic algorithms (GAs) help the researcher to explore various combinations of trading rules or their parameters, which the human mind is unable to find. This chapter explains genetic algorithms (GAs) in brief and gives insight on how they find better trading strategies. Some of the manual trading strategies are good in nature. Genetic algorithms (GAs) only addition to them. Interfacing genetic algorithms (GAs) with stock trading systems or developing a combined model requires a large degree of imagination and creativity. It is an art not a scientific invention. Genetic algorithms (GAs) make use of computers to find various interesting trading systems.","PeriodicalId":101845,"journal":{"name":"Advances in Computational Intelligence and Robotics","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128537491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Handbook of Research on Innovations and Applications of AI, IoT, and Cognitive Technologies","authors":"","doi":"10.4018/978-1-7998-6870-5","DOIUrl":"https://doi.org/10.4018/978-1-7998-6870-5","url":null,"abstract":"","PeriodicalId":101845,"journal":{"name":"Advances in Computational Intelligence and Robotics","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124561859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Problem Definition","authors":"Tom O’Hara","doi":"10.1201/b18497-2","DOIUrl":"https://doi.org/10.1201/b18497-2","url":null,"abstract":"This chapter begins with the Socrates DigitalTM module calling the “Define Problem” process. This process identifies the problem area and gathers the problem-defining information from the user. This chapter provides pseudo-code for the subprocesses that make up the processes for Socrates DigitalTM. It has enough detail to implement the logic in any procedural and general-purpose computer programming language. This chapter shows that more questions follow after asking the user a question in many situations. The questions aimed at getting these answers are questions that target the quality of reasoning.","PeriodicalId":101845,"journal":{"name":"Advances in Computational Intelligence and Robotics","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123496616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}