Advances in Computational Intelligence and Robotics最新文献

筛选
英文 中文
Genetic Algorithms and Applications for Stock Trading Optimization 遗传算法及其在股票交易优化中的应用
Advances in Computational Intelligence and Robotics Pub Date : 2021-07-12 DOI: 10.4018/978-1-7998-4105-0
S. Dey, V. Kapoor
{"title":"Genetic Algorithms and Applications for Stock Trading Optimization","authors":"S. Dey, V. Kapoor","doi":"10.4018/978-1-7998-4105-0","DOIUrl":"https://doi.org/10.4018/978-1-7998-4105-0","url":null,"abstract":"","PeriodicalId":101845,"journal":{"name":"Advances in Computational Intelligence and Robotics","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123275712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Application of Direct and Indirect Human-Centered Design Techniques With Dyslexic Users 直接和间接以人为本的设计技术在阅读困难用户中的应用
Advances in Computational Intelligence and Robotics Pub Date : 2019-05-01 DOI: 10.4018/978-1-5225-9069-9.CH001
Dominik Hagelkruys, R. Motschnig
{"title":"Application of Direct and Indirect Human-Centered Design Techniques With Dyslexic Users","authors":"Dominik Hagelkruys, R. Motschnig","doi":"10.4018/978-1-5225-9069-9.CH001","DOIUrl":"https://doi.org/10.4018/978-1-5225-9069-9.CH001","url":null,"abstract":"Designing for people with special needs, especially cognitive and affective needs, can be challenging. Human-centered design (HCD), which inherently promotes user-inclusion and promises products that fit the users' needs, seems to be an optimal solution for such tasks. But can an HCD-approach be easily applied with special needs users? How much adaptation is necessary to perform classical HCD-techniques with users affected by certain difficulties? This chapter discusses the insights gathered and strategies adopted while applying human-centered design in the LITERACY-project, a project of the European Union aiming at improving social inclusion of youth and adults with dyslexia, by creating an interactive web-portal. Hopefully, this case study provides insight on and gives courage for inclusion of end-users even though—or particularly because—they have special needs.","PeriodicalId":101845,"journal":{"name":"Advances in Computational Intelligence and Robotics","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125864809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
System Design and Development 系统设计与开发
Advances in Computational Intelligence and Robotics Pub Date : 2008-04-10 DOI: 10.1002/9780470770931.CH11
I. Moir, A. Seabridge
{"title":"System Design and Development","authors":"I. Moir, A. Seabridge","doi":"10.1002/9780470770931.CH11","DOIUrl":"https://doi.org/10.1002/9780470770931.CH11","url":null,"abstract":"This chapter presents the Socrates DigitalTM system's design and development process. It describes the four phases of design and development: understand, explore, materialize, and realize. The completion of these four phases results in a Socrates DigitalTM system that leverages artificial intelligence services. The artificial intelligence services include a natural language processor provided by several artificial intelligence service providers, including Apple, Microsoft, Google, IBM, and Amazon.","PeriodicalId":101845,"journal":{"name":"Advances in Computational Intelligence and Robotics","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123667986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Artificial Intelligence and Security Challenges in Emerging Networks 新兴网络中的人工智能和安全挑战
Advances in Computational Intelligence and Robotics Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-7353-1
{"title":"Artificial Intelligence and Security Challenges in Emerging Networks","authors":"","doi":"10.4018/978-1-5225-7353-1","DOIUrl":"https://doi.org/10.4018/978-1-5225-7353-1","url":null,"abstract":"","PeriodicalId":101845,"journal":{"name":"Advances in Computational Intelligence and Robotics","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117215164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Dialog Development Manager 对话开发经理
Advances in Computational Intelligence and Robotics Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-7955-8.ch009
{"title":"Dialog Development Manager","authors":"","doi":"10.4018/978-1-7998-7955-8.ch009","DOIUrl":"https://doi.org/10.4018/978-1-7998-7955-8.ch009","url":null,"abstract":"This chapter shows how software development professionals use the provided flow charts and pseudo-code to create the Dialog Development Manager. Analysts then use the Dialog Development Manager to create the problem-specific knowledge needed by a natural language processor to support the conversation between Socrates DigitalTM and end users. The Dialog Development Manager guides the analysts through design and development of the Understand, Explore, Materialize, and Realize phases to create the conversational interface for Socrates DigitalTM.","PeriodicalId":101845,"journal":{"name":"Advances in Computational Intelligence and Robotics","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123585619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security in Wireless Sensor Networks 无线传感器网络的安全性
Advances in Computational Intelligence and Robotics Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-7338-8.CH011
Mekelleche Fatiha, H. Hafid, Ould bouamama Belkacem
{"title":"Security in Wireless Sensor Networks","authors":"Mekelleche Fatiha, H. Hafid, Ould bouamama Belkacem","doi":"10.4018/978-1-5225-7338-8.CH011","DOIUrl":"https://doi.org/10.4018/978-1-5225-7338-8.CH011","url":null,"abstract":"A wireless sensor network (WSN) is a special ad hoc network. It consists of a large number of sensors communicating with wireless links to monitor the real-world environment. They have limited energy, computational power, memory, and transmission range. They are widely used in different fields like military operations, environmental monitoring, and healthcare applications. However, the openness and hostility of the deployment space and the resources limitations make these networks vulnerable to several types of attacks and intrusions. So, the WSN security becomes a real challenge. Principally, the attacks in the network aim at damaging the smooth running of the legitimate nodes and cause a dysfunction of the network. Sybil attack is one of the perilous attacks which affects the WSN networks and poses threats to many security goals. This attack makes the sensor node into Sybil node and illegitimately takes and claims multiple identities.","PeriodicalId":101845,"journal":{"name":"Advances in Computational Intelligence and Robotics","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122638316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
“Think of the Children!” “想想孩子们吧!”
Advances in Computational Intelligence and Robotics Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-9069-9.CH014
Hsiu-Feng Wang
{"title":"“Think of the Children!”","authors":"Hsiu-Feng Wang","doi":"10.4018/978-1-5225-9069-9.CH014","DOIUrl":"https://doi.org/10.4018/978-1-5225-9069-9.CH014","url":null,"abstract":"This experiment examined children's visual aesthetics and learning motivation with regard to websites. It applied Berlyne's theory of aesthetic preference to these websites. The experiment explored the relations between visual complexity, visual aesthetics, learning motivation, and children's age, and their effect on websites. A total of 150 children between 10 and 12 years old were involved. The children were asked to rate websites of different levels of perceived visual complexity in terms of visual aesthetic and learning motivation. The results showed that the children preferred websites that displayed a medium level of perceived visual complexity to those that displayed a high or low level of perceived visual complexity. Thus, the results supported Berlyne's theory. However, when aesthetic preference was analyzed with respect to age-related differences, it was found that older children preferred a medium level of perceived visual complexity and younger children preferred a high level of perceived visual complexity.","PeriodicalId":101845,"journal":{"name":"Advances in Computational Intelligence and Robotics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129547826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using Genetic Algorithms to Develop Investment Strategies 利用遗传算法制定投资策略
Advances in Computational Intelligence and Robotics Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-4105-0.ch011
{"title":"Using Genetic Algorithms to Develop Investment Strategies","authors":"","doi":"10.4018/978-1-7998-4105-0.ch011","DOIUrl":"https://doi.org/10.4018/978-1-7998-4105-0.ch011","url":null,"abstract":"Genetic algorithms (GAs) are a powerful search technique. The use of genetic algorithms (GAs) will help in the development of better trading systems. The genetic algorithms (GAs) help the researcher to explore various combinations of trading rules or their parameters, which the human mind is unable to find. This chapter explains genetic algorithms (GAs) in brief and gives insight on how they find better trading strategies. Some of the manual trading strategies are good in nature. Genetic algorithms (GAs) only addition to them. Interfacing genetic algorithms (GAs) with stock trading systems or developing a combined model requires a large degree of imagination and creativity. It is an art not a scientific invention. Genetic algorithms (GAs) make use of computers to find various interesting trading systems.","PeriodicalId":101845,"journal":{"name":"Advances in Computational Intelligence and Robotics","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128537491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Handbook of Research on Innovations and Applications of AI, IoT, and Cognitive Technologies 人工智能、物联网和认知技术创新与应用研究手册
Advances in Computational Intelligence and Robotics Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-6870-5
{"title":"Handbook of Research on Innovations and Applications of AI, IoT, and Cognitive Technologies","authors":"","doi":"10.4018/978-1-7998-6870-5","DOIUrl":"https://doi.org/10.4018/978-1-7998-6870-5","url":null,"abstract":"","PeriodicalId":101845,"journal":{"name":"Advances in Computational Intelligence and Robotics","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124561859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Problem Definition 问题定义
Advances in Computational Intelligence and Robotics Pub Date : 1900-01-01 DOI: 10.1201/b18497-2
Tom O’Hara
{"title":"Problem Definition","authors":"Tom O’Hara","doi":"10.1201/b18497-2","DOIUrl":"https://doi.org/10.1201/b18497-2","url":null,"abstract":"This chapter begins with the Socrates DigitalTM module calling the “Define Problem” process. This process identifies the problem area and gathers the problem-defining information from the user. This chapter provides pseudo-code for the subprocesses that make up the processes for Socrates DigitalTM. It has enough detail to implement the logic in any procedural and general-purpose computer programming language. This chapter shows that more questions follow after asking the user a question in many situations. The questions aimed at getting these answers are questions that target the quality of reasoning.","PeriodicalId":101845,"journal":{"name":"Advances in Computational Intelligence and Robotics","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123496616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 155
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信
小红书