Pub Date : 1900-01-01DOI: 10.4018/978-1-7998-3479-3.ch093
I. Oke, Fehintola Ezekiel Oluwaseun, J. Amoko, S. Lukman, A. Adedayo
The main aim of this chapter is to conduct a simple literature review on treatment wastewaters from pharmaceutical and related industries and establish efficacies of electrochemical treatment technique in removing selected pollutants form raw wastewater. Synthetic (simulated) wastewaters were prepared using standard methods. Fractional factorial (2K - P -1) experiments were utilized at random to determine influence of selected factors (separation distance between the electrodes, volume of the wastewater used, applied current, temperature of the wastewater, treatment time, concentration of the pollutant, concentration calcium of hypochrite (Ca(OCl)2) added and depth of the electrode into the wastewater used) on efficiency of electrochemical process in removing Biochemical Oxygen Demand concentration at five (BOD5). Industrial wastewaters were collected from industrial sources within the country (Nigeria). The industrial wastewaters collected were subjected to electrochemical treatment and chemical treatments individually and in combinations under specified treatment conditions.
本章的主要目的是对制药及相关行业的废水处理进行简单的文献综述,并建立电化学处理技术在去除原废水中选定污染物方面的效果。采用标准方法制备合成(模拟)废水。随机采用分数析因(2K - P -1)实验,确定所选因素(电极之间的分离距离、使用废水的体积、施加电流、废水温度、处理时间、污染物浓度、次氯酸钙(Ca(OCl)2)的添加浓度和电极进入使用废水的深度)对电化学过程去除生化需氧量浓度为5 (BOD5)的效率的影响。从国内的工业来源收集工业废水(尼日利亚)。收集的工业废水在规定的处理条件下分别进行电化学处理和化学处理。
{"title":"Inhibited Antibiotic-Resistant and Electrochemical Treatment of Pharmaceutical Wastewater","authors":"I. Oke, Fehintola Ezekiel Oluwaseun, J. Amoko, S. Lukman, A. Adedayo","doi":"10.4018/978-1-7998-3479-3.ch093","DOIUrl":"https://doi.org/10.4018/978-1-7998-3479-3.ch093","url":null,"abstract":"The main aim of this chapter is to conduct a simple literature review on treatment wastewaters from pharmaceutical and related industries and establish efficacies of electrochemical treatment technique in removing selected pollutants form raw wastewater. Synthetic (simulated) wastewaters were prepared using standard methods. Fractional factorial (2K - P -1) experiments were utilized at random to determine influence of selected factors (separation distance between the electrodes, volume of the wastewater used, applied current, temperature of the wastewater, treatment time, concentration of the pollutant, concentration calcium of hypochrite (Ca(OCl)2) added and depth of the electrode into the wastewater used) on efficiency of electrochemical process in removing Biochemical Oxygen Demand concentration at five (BOD5). Industrial wastewaters were collected from industrial sources within the country (Nigeria). The industrial wastewaters collected were subjected to electrochemical treatment and chemical treatments individually and in combinations under specified treatment conditions.","PeriodicalId":101975,"journal":{"name":"Encyclopedia of Information Science and Technology, Fifth Edition","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133847221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-7998-3479-3.ch091
I. Oke, Lukman Salihu, I. Mohammed, Asani M. Afolabi
This chapter provides information on the quantities and properties of healthcare wastes in various types of facilities located in developing countries, as well as in some industrialized countries. Most of the information has been obtained from the literature, while some information has been collected by the authors and from reports available to the authors. The range of hospital waste generation varies from 0.016 to 3.23 kg/bed-day. The relatively wide variation is due to the fact that some of the facilities surveyed may include out-patient services and district health clinics; these facilities essentially provide basic services and thus the quantities of waste generated are relatively small. On the other hand, the reported amount of infectious waste varied from 0.01 to 0.65 kg/bed-day. The characteristics of the components of healthcare wastes, such as the bulk density and the calorific value, have substantial variability. It was concluded that the world has made only slow progress in proper medical in past decades, with dramatic differences among countries and regions.
{"title":"Overview of Solid Waste Management of Healthcare and Related Organisations","authors":"I. Oke, Lukman Salihu, I. Mohammed, Asani M. Afolabi","doi":"10.4018/978-1-7998-3479-3.ch091","DOIUrl":"https://doi.org/10.4018/978-1-7998-3479-3.ch091","url":null,"abstract":"This chapter provides information on the quantities and properties of healthcare wastes in various types of facilities located in developing countries, as well as in some industrialized countries. Most of the information has been obtained from the literature, while some information has been collected by the authors and from reports available to the authors. The range of hospital waste generation varies from 0.016 to 3.23 kg/bed-day. The relatively wide variation is due to the fact that some of the facilities surveyed may include out-patient services and district health clinics; these facilities essentially provide basic services and thus the quantities of waste generated are relatively small. On the other hand, the reported amount of infectious waste varied from 0.01 to 0.65 kg/bed-day. The characteristics of the components of healthcare wastes, such as the bulk density and the calorific value, have substantial variability. It was concluded that the world has made only slow progress in proper medical in past decades, with dramatic differences among countries and regions.","PeriodicalId":101975,"journal":{"name":"Encyclopedia of Information Science and Technology, Fifth Edition","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115411263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-7998-3479-3.ch057
B. Rao
The chapter is about the clustering of text documents based on the input of the n-number of words on the m-number of text documents using graph mining techniques. The author has proposed an algorithm for clustering of text documents by inputting n-number of words on m-number of text documents. First of all the proposed algorithm starts the selection of documents with extension name “.txt” from m-numbers of documents having various types of extension names. The n-number of words are input on the selected “.txt” documents, the algorithm starts n-clustering of text documents based on an n-input word. This is possible by way of creation of a document-word frequency matrix in the memory. Then the frequency-word table is converted into the un-oriented document-word incidence matrix by replacing all non-zeros with 1s. Using the un-oriented document-word incidence matrix, the algorithm starts the creation of n-number of clusters of text documents having the presence of words ranging from 1 to n respectively. Finally, these n-clusters based on word-wise as well as 1 to n word-wise.
{"title":"N-Clustering of Text Documents Using Graph Mining Techniques","authors":"B. Rao","doi":"10.4018/978-1-7998-3479-3.ch057","DOIUrl":"https://doi.org/10.4018/978-1-7998-3479-3.ch057","url":null,"abstract":"The chapter is about the clustering of text documents based on the input of the n-number of words on the m-number of text documents using graph mining techniques. The author has proposed an algorithm for clustering of text documents by inputting n-number of words on m-number of text documents. First of all the proposed algorithm starts the selection of documents with extension name “.txt” from m-numbers of documents having various types of extension names. The n-number of words are input on the selected “.txt” documents, the algorithm starts n-clustering of text documents based on an n-input word. This is possible by way of creation of a document-word frequency matrix in the memory. Then the frequency-word table is converted into the un-oriented document-word incidence matrix by replacing all non-zeros with 1s. Using the un-oriented document-word incidence matrix, the algorithm starts the creation of n-number of clusters of text documents having the presence of words ranging from 1 to n respectively. Finally, these n-clusters based on word-wise as well as 1 to n word-wise.","PeriodicalId":101975,"journal":{"name":"Encyclopedia of Information Science and Technology, Fifth Edition","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125175142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-7998-3479-3.ch112
M. Korstanje
This chapter ignites an interesting discussion around the idea of apocalypse or at the best to the role of technology by slicing humanity from nature. In terms of the British anthropologist Tim Ingold, one of the conceptual limitations of “dwelling perspective” as a project is the clear-cut division of humans from the natural environment. Unlike hunters and gatherers who have developed “relational” ties with the sensual world, we are educated to imagine ourselves as administrators of natural world. In view of this, the eco-friendly projects (as conservation parks) often exclude the presence of humans. The employment of technology denotes certain rationality which while sorting the environment according to our needs it creates a sentiment of culprit, which is expressed in the bottom-days´ narratives. Mankind, as outstanding specie, is the only one gifted by Gods to administer nature, but failed. Moved by greed and speculations, men governed with energy in backs to God and for that, they should be heavily punished.
{"title":"Technology and the Theory of Apocalypse","authors":"M. Korstanje","doi":"10.4018/978-1-7998-3479-3.ch112","DOIUrl":"https://doi.org/10.4018/978-1-7998-3479-3.ch112","url":null,"abstract":"This chapter ignites an interesting discussion around the idea of apocalypse or at the best to the role of technology by slicing humanity from nature. In terms of the British anthropologist Tim Ingold, one of the conceptual limitations of “dwelling perspective” as a project is the clear-cut division of humans from the natural environment. Unlike hunters and gatherers who have developed “relational” ties with the sensual world, we are educated to imagine ourselves as administrators of natural world. In view of this, the eco-friendly projects (as conservation parks) often exclude the presence of humans. The employment of technology denotes certain rationality which while sorting the environment according to our needs it creates a sentiment of culprit, which is expressed in the bottom-days´ narratives. Mankind, as outstanding specie, is the only one gifted by Gods to administer nature, but failed. Moved by greed and speculations, men governed with energy in backs to God and for that, they should be heavily punished.","PeriodicalId":101975,"journal":{"name":"Encyclopedia of Information Science and Technology, Fifth Edition","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132825321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-7998-3479-3.ch108
Khaled Tamzini, Ynes Hafi, Achref Ben Ouannes, Roula Borhani
The aim of this chapter is to present the implementation of a pilot digital participatory platform (DPP) called “Baladiaty” in order to foster local government-citizens collaboration and participation in Tunisia. “Baladiaty” means in the Arabic language “My municipality”. “Baladiaty” is a DPP designed, developed, and commercialized by ARSELA in 2019, a Tunisian start-up located in the governorate of Sousse. This paper contains two main parts. The first is considered a theoretical part. The authors will focus on the two main terms and concepts of this research, namely: digital democracy and DPP. This first part will focus on the definition of the digital participatory platform (DPP), and its role in promoting participatory democracy, citizen engagement and their ubiquitous engagement throughout the open government concept. The second part would be considered as a case study presenting a recently designed pilot DPP “Baladiaty” in Tunisia. This paper could be considered theoretical by focusing on the presentation of a pilot DPP in Tunisia, a nascent democracy.
{"title":"The Role of DPPs in Promoting Local Government-Citizen Collaboration and Participation","authors":"Khaled Tamzini, Ynes Hafi, Achref Ben Ouannes, Roula Borhani","doi":"10.4018/978-1-7998-3479-3.ch108","DOIUrl":"https://doi.org/10.4018/978-1-7998-3479-3.ch108","url":null,"abstract":"The aim of this chapter is to present the implementation of a pilot digital participatory platform (DPP) called “Baladiaty” in order to foster local government-citizens collaboration and participation in Tunisia. “Baladiaty” means in the Arabic language “My municipality”. “Baladiaty” is a DPP designed, developed, and commercialized by ARSELA in 2019, a Tunisian start-up located in the governorate of Sousse. This paper contains two main parts. The first is considered a theoretical part. The authors will focus on the two main terms and concepts of this research, namely: digital democracy and DPP. This first part will focus on the definition of the digital participatory platform (DPP), and its role in promoting participatory democracy, citizen engagement and their ubiquitous engagement throughout the open government concept. The second part would be considered as a case study presenting a recently designed pilot DPP “Baladiaty” in Tunisia. This paper could be considered theoretical by focusing on the presentation of a pilot DPP in Tunisia, a nascent democracy.","PeriodicalId":101975,"journal":{"name":"Encyclopedia of Information Science and Technology, Fifth Edition","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114154719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-7998-3479-3.ch015
M. Rathore, U. Suman
Cloud computing is getting more popular due to its extraordinary features such as on-demand availability of computing resources and software services. A variety of services have been deployed to offer analogous functionalities. However, the difficulty to identify reliable services has fascinated the attention of researchers. Thus, the trust and reputation concept have been introduced to evaluate the trustworthiness of services over cloud. Most of the existing research works fully trust on service user's feedback rating for ranking cloud services, which may often lead to biasness towards positive and negative feedback rating. To avoid aforementioned issues, this chapter proposes a novel approach to evaluate cloud service reputation along with cloud service reputation evaluation model to discover reliable cloud services. Experimental result shows that proposed approach provides effective solution for prediction of cloud service reputation, which can be helpful in performing reliable service discovery and selection over cloud.
{"title":"A Collaborative Ranking Approach for Discovery and Selection of Cloud Services","authors":"M. Rathore, U. Suman","doi":"10.4018/978-1-7998-3479-3.ch015","DOIUrl":"https://doi.org/10.4018/978-1-7998-3479-3.ch015","url":null,"abstract":"Cloud computing is getting more popular due to its extraordinary features such as on-demand availability of computing resources and software services. A variety of services have been deployed to offer analogous functionalities. However, the difficulty to identify reliable services has fascinated the attention of researchers. Thus, the trust and reputation concept have been introduced to evaluate the trustworthiness of services over cloud. Most of the existing research works fully trust on service user's feedback rating for ranking cloud services, which may often lead to biasness towards positive and negative feedback rating. To avoid aforementioned issues, this chapter proposes a novel approach to evaluate cloud service reputation along with cloud service reputation evaluation model to discover reliable cloud services. Experimental result shows that proposed approach provides effective solution for prediction of cloud service reputation, which can be helpful in performing reliable service discovery and selection over cloud.","PeriodicalId":101975,"journal":{"name":"Encyclopedia of Information Science and Technology, Fifth Edition","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114658938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-7998-3479-3.ch096
Sam Wong
Information and communication technologies (ICTs) have long been seen as a solution to problems associated with climate change. Their effectiveness has, however, been questioned for not taking gender seriously. This paper tries to explain why, and how, women are more constrained than men from using ICTs in tackling climate change. Women have less access to technology information and finance and suffer greater deprivation in terms of land rights. Intersected with the analysis of class, this chapter also examines why poor, working class households are less represented in decision-making in policy design and resource allocations. To address the gender inequalities, this paper calls for a need to contextualise the process of gender mainstreaming and to scrutinise the interplay between old and new institutions in gender inclusion. Apart from advocating gender-sensitive funding mechanisms for needy women, and men, it also suggests a deeper understanding of the agency-structure dynamics and the gender-class interactions in tackling digital exclusion.
{"title":"Gendering Information and Communication Technologies in Climate Change","authors":"Sam Wong","doi":"10.4018/978-1-7998-3479-3.ch096","DOIUrl":"https://doi.org/10.4018/978-1-7998-3479-3.ch096","url":null,"abstract":"Information and communication technologies (ICTs) have long been seen as a solution to problems associated with climate change. Their effectiveness has, however, been questioned for not taking gender seriously. This paper tries to explain why, and how, women are more constrained than men from using ICTs in tackling climate change. Women have less access to technology information and finance and suffer greater deprivation in terms of land rights. Intersected with the analysis of class, this chapter also examines why poor, working class households are less represented in decision-making in policy design and resource allocations. To address the gender inequalities, this paper calls for a need to contextualise the process of gender mainstreaming and to scrutinise the interplay between old and new institutions in gender inclusion. Apart from advocating gender-sensitive funding mechanisms for needy women, and men, it also suggests a deeper understanding of the agency-structure dynamics and the gender-class interactions in tackling digital exclusion.","PeriodicalId":101975,"journal":{"name":"Encyclopedia of Information Science and Technology, Fifth Edition","volume":"375 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114882694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-7998-3479-3.ch018
N. Chauhan, H. Kumar
Distributed computing system (DCS) is a very popular field of computer science. DCS consists of various computers (processors) located at possibly different sites and connected by a communication link in such a manner that it appears as one system to the user. Tasks scheduling is a very interesting field of research in DCS. The main objectives of tasks scheduling problems are load balancing of processors, maximization of system reliability, minimizing the system cost, and minimizing the response time. Obviously, it is very complicated to satisfy all of the above objectives simultaneously. So, most of the researchers have solved the tasks scheduling problem with one or more objectives. The purpose of this chapter is to produce an overview of much (certainly not all) of tasks scheduling algorithms. The chapter is covering the little much valuable survey, tasks scheduling strategies, and different approaches used for tasks scheduling with one or more objectives.
{"title":"A Survey of Tasks Scheduling Algorithms in Distributed Computing Systems","authors":"N. Chauhan, H. Kumar","doi":"10.4018/978-1-7998-3479-3.ch018","DOIUrl":"https://doi.org/10.4018/978-1-7998-3479-3.ch018","url":null,"abstract":"Distributed computing system (DCS) is a very popular field of computer science. DCS consists of various computers (processors) located at possibly different sites and connected by a communication link in such a manner that it appears as one system to the user. Tasks scheduling is a very interesting field of research in DCS. The main objectives of tasks scheduling problems are load balancing of processors, maximization of system reliability, minimizing the system cost, and minimizing the response time. Obviously, it is very complicated to satisfy all of the above objectives simultaneously. So, most of the researchers have solved the tasks scheduling problem with one or more objectives. The purpose of this chapter is to produce an overview of much (certainly not all) of tasks scheduling algorithms. The chapter is covering the little much valuable survey, tasks scheduling strategies, and different approaches used for tasks scheduling with one or more objectives.","PeriodicalId":101975,"journal":{"name":"Encyclopedia of Information Science and Technology, Fifth Edition","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116916621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-7998-3479-3.ch077
A. Dimou, A. Syropoulos
Digital documents tend to replace printed documents in many ways. For publishers it is cheaper to produce them and readers can get them instantly. However, the spectrum of “printed” material is quite big and so there is no way to have one kind of digital document that can satisfy all those involved in the publishing business (e.g., authors, readers, publishers, etc.). Digital document appeared in the 1960s and ever since they evolve. Sometimes this evolution process is slow and sometimes it's rapid, but the fact is that today there a plethora of digital document forms that can be used for many and different tasks and most of them are briefly documented here.
{"title":"Digital Documents","authors":"A. Dimou, A. Syropoulos","doi":"10.4018/978-1-7998-3479-3.ch077","DOIUrl":"https://doi.org/10.4018/978-1-7998-3479-3.ch077","url":null,"abstract":"Digital documents tend to replace printed documents in many ways. For publishers it is cheaper to produce them and readers can get them instantly. However, the spectrum of “printed” material is quite big and so there is no way to have one kind of digital document that can satisfy all those involved in the publishing business (e.g., authors, readers, publishers, etc.). Digital document appeared in the 1960s and ever since they evolve. Sometimes this evolution process is slow and sometimes it's rapid, but the fact is that today there a plethora of digital document forms that can be used for many and different tasks and most of them are briefly documented here.","PeriodicalId":101975,"journal":{"name":"Encyclopedia of Information Science and Technology, Fifth Edition","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133931903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-7998-3479-3.ch002
M. Véstias
Machine learning is the study of algorithms and models for computing systems to do tasks based on pattern identification and inference. When it is difficult or infeasible to develop an algorithm to do a particular task, machine learning algorithms can provide an output based on previous training data. A well-known machine learning model is deep learning. The most recent deep learning models are based on artificial neural networks (ANN). There exist several types of artificial neural networks including the feedforward neural network, the Kohonen self-organizing neural network, the recurrent neural network, the convolutional neural network, the modular neural network, among others. This article focuses on convolutional neural networks with a description of the model, the training and inference processes and its applicability. It will also give an overview of the most used CNN models and what to expect from the next generation of CNN models.
{"title":"Convolutional Neural Network","authors":"M. Véstias","doi":"10.4018/978-1-7998-3479-3.ch002","DOIUrl":"https://doi.org/10.4018/978-1-7998-3479-3.ch002","url":null,"abstract":"Machine learning is the study of algorithms and models for computing systems to do tasks based on pattern identification and inference. When it is difficult or infeasible to develop an algorithm to do a particular task, machine learning algorithms can provide an output based on previous training data. A well-known machine learning model is deep learning. The most recent deep learning models are based on artificial neural networks (ANN). There exist several types of artificial neural networks including the feedforward neural network, the Kohonen self-organizing neural network, the recurrent neural network, the convolutional neural network, the modular neural network, among others. This article focuses on convolutional neural networks with a description of the model, the training and inference processes and its applicability. It will also give an overview of the most used CNN models and what to expect from the next generation of CNN models.","PeriodicalId":101975,"journal":{"name":"Encyclopedia of Information Science and Technology, Fifth Edition","volume":"158 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131091622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}