{"title":"Development of the Enhanced Piece-Wise Linear Neural Network Algorithm","authors":"Veronica Chan, Christine W. Chan","doi":"10.4018/978-1-7998-3038-2.ch006","DOIUrl":"https://doi.org/10.4018/978-1-7998-3038-2.ch006","url":null,"abstract":"This chapter discusses development, application, and enhancement of a decomposition neural network rule extraction algorithm for nonlinear regression problems. The dual objectives of developing the algorithms are (1) to generate good predictive models comparable in performance to the original artificial neural network (ANN) models and (2) to “open up” the black box of a neural network model and provide explicit information in the form of rules that are expressed as linear equations. The enhanced PWL-ANN algorithm improves upon the PWL-ANN algorithm because it can locate more than two breakpoints and better approximate the hidden sigmoid activation functions of the ANN. Comparison of the results produced by the two versions of the PWL-ANN algorithm showed that the enhanced PWL-ANN models provide higher predictive accuracies and improved fidelities compared to the originally trained ANN models than the PWL-ANN models.","PeriodicalId":101845,"journal":{"name":"Advances in Computational Intelligence and Robotics","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114805356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Petr Chetyrbok, N. Oleinikov, Angela N. Mayorova, Daniel Gorobets, Elena Ponomareva, Elena Sergeeva
{"title":"Computational Intelligence in the Internet of Things","authors":"Petr Chetyrbok, N. Oleinikov, Angela N. Mayorova, Daniel Gorobets, Elena Ponomareva, Elena Sergeeva","doi":"10.4018/978-1-5225-7955-7","DOIUrl":"https://doi.org/10.4018/978-1-5225-7955-7","url":null,"abstract":"The paper considers the classification of computational intelligence methods and their further development with the use of hybrid technologies for managing the Internet of things. The new paradigm of the Internet of Things allows the use of various objects in a wider range of tasks. In healthcare, devices are being developed for many purposes, such as monitoring patients to help them cope with chronic illnesses, recover from injuries, or prevent strokes. Thus, in order to realize a dynamic new generation technology, corresponding to the new paradigm of the \"Internet of Things\", it is proposed to use machine-learning algorithms in hybrid technology, which will make it possible not only to protect confidential patient data, but also to analyze them and make assumptions.","PeriodicalId":101845,"journal":{"name":"Advances in Computational Intelligence and Robotics","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131926727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pedro Henrique Roscoe Lage de Oliveira, Carlos Alberto Silva de Miranda, J. Gomide
{"title":"Applied Alternative Tools and Methods in the Replacement of the Game Design Document","authors":"Pedro Henrique Roscoe Lage de Oliveira, Carlos Alberto Silva de Miranda, J. Gomide","doi":"10.4018/978-1-5225-9069-9.CH009","DOIUrl":"https://doi.org/10.4018/978-1-5225-9069-9.CH009","url":null,"abstract":"This chapter proposes and experiments alternatives to replace or optimize the use of the game design document (GDD). The creation and development of a game is accomplished by relying on the GDD, which contains all the information, such as the script, mechanics, and relevant details, so the team can use as a guide. There is no exact formula for creating a GDD, and several formats are proposed and used nowadays. Information misinterpreted or misunderstood at different levels of responsibility can create irreparable problems after the start of production. This chapter proposes the use of analog prototyping associated with benchmarking techniques and agile development as efficient alternatives to GDD, which are tested in the development of the game Forsaken Dungeons, created by one of the authors.","PeriodicalId":101845,"journal":{"name":"Advances in Computational Intelligence and Robotics","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131822145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Marisardo Bezerra de Medeiros Filho, F. Fernandes, Felipe Matheus Calado, André M. M. Neves
{"title":"An ARM Framework for F2P Mobile Games","authors":"Marisardo Bezerra de Medeiros Filho, F. Fernandes, Felipe Matheus Calado, André M. M. Neves","doi":"10.4018/978-1-5225-9069-9.CH011","DOIUrl":"https://doi.org/10.4018/978-1-5225-9069-9.CH011","url":null,"abstract":"This chapter presents an ARM (acquisition, retention, and monetization) framework for F2P (free-to-play) mobile games to be used as to support game design practice and research. ARM strategies are dispersed throughout various sources such as websites, papers, and books, hampering the work of researchers and practitioners in this field. The aim of this framework is to list and organize these strategies into a single source. A literature research about ARM strategies in F2P mobile games was conducted to identify and select elements. Based on surveys with game development professionals, some of these elements were polished, merged, or removed. Finally, these elements were organized into a single framework, consisting of 3 main categories (acquisition, retention, and monetization), 8 subcategories, and 59 specific elements.","PeriodicalId":101845,"journal":{"name":"Advances in Computational Intelligence and Robotics","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114566487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Genetic Algorithms (GAs) and Their Mathematical Foundations","authors":"","doi":"10.4018/978-1-7998-4105-0.ch004","DOIUrl":"https://doi.org/10.4018/978-1-7998-4105-0.ch004","url":null,"abstract":"In this chapter, the authors back GA procedures using old mathematical facts. More rigorous working of mathematical facts about GAs are raised in this chapter. In fact, there are a large number of similarities in the population of strings. The authors see how GA exploits these similarities to generate good solutions. So, in this whole procedure they show which schema or pattern will grow and which pattern will die or be lost as generation passes by due to the effect of selection, crossover, and mutation operator. The study of this building block hypothesis, leads to better understanding of GA. It will also help us to reach optimal solutions in much less time.","PeriodicalId":101845,"journal":{"name":"Advances in Computational Intelligence and Robotics","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117065509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Introduction to Genetic Algorithms in Search and Optimization","authors":"","doi":"10.4018/978-1-7998-4105-0.ch003","DOIUrl":"https://doi.org/10.4018/978-1-7998-4105-0.ch003","url":null,"abstract":"This chapter is all about introducing genetic algorithms in the search process, which are based on the theory of natural selection, genetics, and survival of fittest. By detailed understanding of the algorithm, one would be able to apply it in your respective field for optimization. At the end of this chapter, the reader will have acquired basic theory and working of these algorithms. Since genetic algorithms are used in diverse fields, the tone and language of this chapter is kept simple and casual for better understanding. Genetic algorithms in this chapter are applied through a hand calculation example. Genetic algorithms are basically mathematical calculations based on Darwin's theory of survival of fittest. This chapter gives a detailed understanding of the theory and working of genetic algorithms based on hand calculation examples. Comparison of genetic algorithms with other search procedures is also done.","PeriodicalId":101845,"journal":{"name":"Advances in Computational Intelligence and Robotics","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124601245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Advanced Concepts, Methods, and Applications in Semantic Computing","authors":"","doi":"10.4018/978-1-7998-6697-8","DOIUrl":"https://doi.org/10.4018/978-1-7998-6697-8","url":null,"abstract":"","PeriodicalId":101845,"journal":{"name":"Advances in Computational Intelligence and Robotics","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129498340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analyzing Future Applications of AI, Sensors, and Robotics in Society","authors":"","doi":"10.4018/978-1-7998-3499-1","DOIUrl":"https://doi.org/10.4018/978-1-7998-3499-1","url":null,"abstract":"","PeriodicalId":101845,"journal":{"name":"Advances in Computational Intelligence and Robotics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130056262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Spam Filtering and Detection","authors":"Yasmin Bouarara","doi":"10.4018/978-1-5225-7338-8.CH010","DOIUrl":"https://doi.org/10.4018/978-1-5225-7338-8.CH010","url":null,"abstract":"In today's world of globalization and technology without borders, the emergence of the internet and the rapid development of telecommunications have made the world a global village. Recently, the email service has become immensely used, and the main means of communication because it is cheap, reliable, fast, and easy to access. In addition, it allows users with a mailbox (BAL) and email address to exchange messages (images, files, and text documents) from anywhere in the world via the internet. Unfortunately, this technology has become undeniably the original source of malicious activity, in particular the problem of unwanted emails (spam), which has increased dramatically over the past decade. According to the latest report from Radicati Group, which provides quantitative and qualitative research with details of the e-mail, security, and social networks, published in 2012, 70-80% of email traffic consists of spam. The goal of the chapter is to give a state of the art on spam and spam techniques and the disadvantages of this phenomenon.","PeriodicalId":101845,"journal":{"name":"Advances in Computational Intelligence and Robotics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131035289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Challenges and Applications for Hand Gesture Recognition","authors":"","doi":"10.4018/978-1-7998-9434-6","DOIUrl":"https://doi.org/10.4018/978-1-7998-9434-6","url":null,"abstract":"","PeriodicalId":101845,"journal":{"name":"Advances in Computational Intelligence and Robotics","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125438013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}