![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter
Conclusion
Now more than ever machine learning and embedded AI will be essential in maintaining information assurance for all aspects of our nation’s security and defense, as well as every transaction we make in governme...
-
Chapter
General Framework of Mathematics
With the explosive growth of data nowadays, a young and interdisciplinary field, data science , has emerged, which uses scientific methods, processes, algorithms, and systems to extract knowledge and insights fr...
-
Chapter
Development of Novel Techniques of CoCoSSC Method
This chapter provides an introduction to our main contributions concerning the development of the novel methods of CoCoSSC.
-
Chapter
Related Work on Geometry of Non-Convex Programs
Over the past few years, there have been increasing interest in understanding the geometry of non-convex programs that naturally arise from machine learning problems. It is particularly interesting to study ad...
-
Chapter
Introduction
Learning has various definitions based on the context in which it is used and the various entities involved in the learning process. The need for machines to learn and thus adapt to the changes in its surround...
-
Chapter
Necessary Notations of the Proposed Method
We define necessary notations and review important definitions that will be used later in our analysis. Let ...
-
Chapter
A Conservation Law Method Based on Optimization
This chapter is organized as follows: In Sect. 8.1, we warm up with an analytical solution for simple 1-D quadratic function. In Sect. 8.2, we propose the artificially dissipating energy algorithm, energy cons...
-
Chapter
Optimization Formulation
Based on the description on the statistics model in the previous section, we formulate the problems that we need to solve from two angles. One is from the field of optimization, the other is from samples of pr...
-
Chapter
Gradient Descent Converges to Minimizers: Optimal and Adaptive Step-Size Rules
As mentioned in Chap. 3, gradient descent (GD) and its variants provide the core optimization methodology in machine learning problems. Given a C 1 or C 2 function...
-
Chapter
Online Discovery for Stable and Grou** Causalities in Multivariate Time Series
The content of this chapter is organized as follows: The problem formulation is presented in Sect. 10.1. Section 10.2 introduces the details about our proposed approach and its equivalent Bayesian model. A sol...
-
Chapter
Improved Sample Complexity in Sparse Subspace Clustering with Noisy and Missing Observations
In this chapter, we show the results of the new CoCoSSC algorithm. The content is organized as follows: The main results concerning CoCoSSC algorithm are shown in Sect. 9.1. Following Sect. 9.1, we show the f...
-
Article
ACSIR: ANOVA Cosine Similarity Image Recommendation in vertical search
In today’s world, online shop** is very attractive and grown exponentially due to revolution in digitization. It is a crucial demand to provide recommendation for all the search engine to identify users’ nee...
-
Article
IR_URFS_VF: image recommendation with user relevance feedback session and visual features in vertical image search
In recent years, online shop** has grown exponentially and huge number of images are available online. Hence, it is necessary to recommend various product images to aid the user in effortless and efficient a...
-
Article
Image recommendation based on keyword relevance using absorbing Markov chain and image features
Image recommendation is an important feature of search engine, as tremendous amount of images are available online. It is necessary to retrieve relevant images to meet the user’s requirement. In this paper, we...
-
Chapter and Conference Paper
ACTM: Anonymity Cluster Based Trust Management in Wireless Sensor Networks
Wireless Sensor Networks consists of sensor nodes that are capable of sensing the information and maintaining security. In this paper, an Anonymity Cluster based Trust Management algorithm(ACTM) is proposed wh...
-
Chapter and Conference Paper
Dynamic Cooperative Routing (DCR) in Wireless Sensor Networks
Wireless Sensor Networks(WSNs) have micro sensors connected in a network with processing capabilities for communications. It is subjected to a set of resource constraints such as battery power, bandwidth and l...
-
Chapter and Conference Paper
RCH-MAC Protocol for Multihop QoS in Wireless Sensor Networks
The design of hybrid MAC protocol in Wireless Sensor Networks for delay sensitive data traffic QoS is a challenging work. We present Reservation Control Hybrid MAC (RCH-MAC) protocol, which reduces end-to-end ...