Résultats de recherche de titre
Articles 1 à 20 sur 4158
Fuzzy Learning and Applications (International Series on Computational Intelligence)
Par Marco Russo. 2000
With low computational complexity and relatively short development time, Fuzzy Logic is an indispensable tool for engineering applications. The field…
is growing at an unprecedented rate, and there is a need for a book that describes essential tools, applications, examples, and perspectives in the field of fuzzy learning. The editors of Fuzzy LearniResponsible Use of AI in Military Systems (Chapman & Hall/CRC Artificial Intelligence and Robotics Series)
Par Jan Maarten Schraagen. 2024
Artificial Intelligence (AI) is widely used in society today. The (mis)use of biased data sets in machine learning applications is…
well‑known, resulting in discrimination and exclusion of citizens. Another example is the use of non‑transparent algorithms that can’t explain themselves to users, resulting in the AI not being trusted and therefore not being used when it might be beneficial to use it.Responsible Use of AI in Military Systems lays out what is required to develop and use AI in military systems in a responsible manner. Current developments in the emerging field of Responsible AI as applied to military systems in general (not merely weapons systems) are discussed. The book takes a broad and transdisciplinary scope by including contributions from the fields of philosophy, law, human factors, AI, systems engineering, and policy development.Divided into five sections, Section I covers various practical models and approaches to implementing military AI responsibly; Section II focuses on liability and accountability of individuals and states; Section III deals with human control in human‑AI military teams; Section IV addresses policy aspects such as multilateral security negotiations; and Section V focuses on ‘autonomy’ and ‘meaningful human control’ in weapons systems.Key Features: Takes a broad transdisciplinary approach to responsible AI Examines military systems in the broad sense of the word Focuses on the practical development and use of responsible AI Presents a coherent set of chapters, as all authors spent two days discussing each other’s work This book provides the reader with a broad overview of all relevant aspects involved with the responsible development, deployment and use of AI in military systems. It stresses both the advantages of AI as well as the potential downsides of including AI in military systems.Learn R: As a Language (Chapman & Hall/CRC The R Series)
Par Pedro J. Aphalo. 2024
Learning a computer language like R can be either frustrating, fun or boring. Having fun requires challenges that wake up…
the learner’s curiosity but also provide an emotional reward for overcoming them. The book is designed so that it includes smaller and bigger challenges, in what I call playgrounds, in the hope that all readers will enjoy their path to R fluency. Fluency in the use of a language is a skill that is acquired through practice and exploration. For students and professionals in the biological sciences, humanities and many applied fields, recognizing the parallels between R and natural languages should help them feel at home with R. The approach I use is similar to that of a travel guide, encouraging exploration and describing the available alternatives and how to reach them. The intention is to guide the reader through the R landscape of 2024 and beyond.What is new in the second edition? Text expanded by more than 25% to include additional R features and gentler and more detailed explanations Contains 24 new diagrams and flowcharts, seven new tables, and revised text and code examples for clarity All three indexes were expanded, and answers to 28 frequently asked questions added What will you find in this book? Programming concepts explained as they apply to current R Emphasis on the role of abstractions in programming Few prescriptive rules—mostly the author’s preferences together with alternatives Presentation of the R language emphasizing the “R way of doing things” Tutoring for “programming in the small” using scripts for data analysis Explanation of the differences between R proper and extensions for data wrangling The grammar of graphics is described as a language for the construction of data visualisations Examples of data exchange between R and the foreign world using common file formats Coaching to become an independent R user, capable of writing original scripts and solving future challengesBuilding China into a Cyber Superpower: Desires, Drivers, and Devices
Par Munish Sharma. 2024
This book provides a comprehensive look into China’s emerging cyberspace strategy. It highlights the prime drivers of China’s desire to…
be a cyber superpower and discusses the ways in which China is turning resources into cyber power.The book analyses China’s domestic cyber policy initiatives, strategy documents, censorship measures, and the rationale behind its strong advocacy for sovereignty in cyberspace. It examines China’s position on the prominent issues of cyberspace governance, norms and security in cyberspace, and key diplomatic initiatives. The book also discusses next-generation networks, artificial intelligence, quantum information sciences, and cyber warfare.An important contribution to the study of China’s cyber policy, the book will be of interest to students and researchers of international relations,Chinese digitalisation, security studies, Chinese politics, international security, Chinese foreign policy, and Chinese economy. It will also be useful to the policymakers and corporate professionals engaged with China’s digital sphere.Transformative Artificial Intelligence provides a comprehensive overview of the latest trends, challenges, applications, and opportunities in the field of Artificial…
Intelligence. The book covers the state of the art in AI research, including machine learning, natural language processing, computer vision, and robotics, and explores how these technologies are transforming various industries and domains, such as healthcare, finance, education, and entertainment.The book also addresses the challenges that come with the widespread adoption of AI, including ethical concerns, bias, and the impact on jobs and society. It provides insights into how to mitigate these challenges and how to design AI systems that are responsible, transparent, and trustworthy.The book offers a forward-looking perspective on the future of AI, exploring the emerging trends and applications that are likely to shape the next decade of AI innovation. It also provides practical guidance for businesses and individuals on how to leverage the power of AI to create new products, services, and opportunities.Overall, the book is an essential read for anyone who wants to stay ahead of the curve in the rapidly evolving field of Artificial Intelligence and understand the impact that this transformative technology will have on our lives in the coming years.Advancement of Data Processing Methods for Artificial and Computing Intelligence (River Publishers Series in Computing and Information Science and Technology)
Par Seema Rawat, V. Ajantha Devi, Praveen Kumar. 2024
This book emphasizes the applications of advances in data processing methods for Artificial Intelligence in today's fast-changing world, as well…
as to serve society through research, innovation, and development in this field. This book is applicable to a wide range of data that contribute to data science concerns and can be used to promote research in this high-potential new field. People's perceptions of the world and how they conduct their lives have changed dramatically as a result of technological advancements. The world has been gripped by technology, and the advances that are being made every day are undeniably transforming the planet. In the domains of Big Data, engineering, and data science, this cutting-edge technology is ready to support us.Artificial intelligence (AI) is a current research topic because it can be applied to a wide range of applications and disciplines to solve complicated problems and find optimal solutions. In research, medicine, technology, and the social sciences, the benefits of AI have already been proven. Data science, also known as pattern analytics and mining, is a technique for extracting useful and relevant information from databases, enabling better decision-making and strategy formulation in a range of fields. As a result of the exponential growth of data in recent years, the combined notions of big data and AI have given rise to many study areas, such as scale-up behaviour from classical algorithms. Furthermore, combining numerous AI technologies from other areas (such as vision, security, control, and biology) in order to build efficient and durable systems that interact in the real world is a new problem. Despite recent improvements in fundamental AI technologies, the integration of these skills into larger, trustworthy, transparent, and maintainable systems is still in its development. Both conceptually and practically, there are a number of unanswered issues.Model-Driven Software Systems Development Using the Meta-Artifact Process
Par Wayne O'Brien. 2024
The importance of architecture for software systems is widely accepted, but the role of architecture in the overall development process…
is not so clear. Presenting an architecture-centric process, Model-Driven Software Systems Development Using the Meta-Artifact Process makes the role of architecture clear. At its core, this book is about developing software systems and, more specifically, software code. It describes three major innovations for making software, which are combined with five widely used enabling technologies, to provide a complete, hypothesis-driven software development process known as Meta-Artifact Process (MAP). Having complete requirements is essential for making good software and supports the hypothesis-driven MAP.MAP offers properties, qualities, and capabilities that help stakeholders and developers understand and reason about a domain and target systems of interest. MAP, through the central role of the Meta-Artifact and incorporating the view that a computer program is a hypothesis about the requirements, offers new ways to look at systems and their development, even changing the roles of developers and stakeholders.Recommending agile methods wherever appropriate while supporting the OMG Essence standard and working within an overarching architecture, MAP presents ways to ensure that the requirements are complete and correct. It helps to identify likely points during development to form alternative hypotheses about them. Because MAP requires an underlying software development process, it can provide that clarity to existing processes in which the organization’s developers are already proficient.This book provides concrete examples from two broad but diverse areas—Accounting Information Systems in the commercial area and a military command and control system—to show the wide applicability of MAP in both commercial and defense domains.This book constitutes the refereed proceedings of the 13th International Conference on Artificial Intelligence in Music, Sound, Art and Design,…
EvoMUSART 2024, held as part of EvoStar 2024, in Aberystwyth, UK, April 3–5, 2024. The 17 full papers and 8 short papers presented in this book were carefully reviewed and selected from 55 submissions. The main purpose of this conference proceedings was to bring together practitioners who are using Artificial Intelligence techniques for artistic tasks, providing the opportunity to promote, present, and discuss ongoing work in the area.Human-Computer Interaction – INTERACT 2023: 19th IFIP TC13 International Conference, York, UK, August 28 – September 1, 2023, Proceedings, Part III (Lecture Notes in Computer Science #14144)
Par José Abdelnour Nocera, Marta Kristín Lárusdóttir, Helen Petrie, Antonio Piccinno, Marco Winckler. 2023
The four-volume set LNCS 14442 -14445 constitutes the proceedings of the 19th IFIP TC 13 International Conference on Human-Computer Interaction,…
INTERACT 2023, held in York, UK, in August/September 2023. The 71 full papers and 58 short papers included in this book were carefully reviewed and selected from 406 submissions. They were organized in topical sections as follows: 3D Interaction; Accessibility; Accessibility and Aging; Accessibility for Auditory/Hearing Disabilities; Co-Design; Cybersecurity and Trust; Data Physicalisation and Cross-device; Eye-Free, Gesture Interaction and Sign Language; Haptic interaction and Healthcare applications; Self-Monitoring; Human-Robot Interaction; Information Visualization; Information Visualization and 3D Interaction; Interacting with Children; Interaction with Conversational Agents; Methodologies for HCI; Model-Based UI Design and Testing; Montion Sickness, Stress and Risk perception in 3D Environments and Multisensory interaction; VR experiences; Natural Language Processing and AI Explainability; Online Collaboration and Cooperative work; Recommendation Systems and AI Explainability; Social AI; Social and Ubiquitous Computing; Social Media and Digital Learning; Understanding Users and Privacy Issues; User movement and 3D Environments; User Self-Report; User Studies; User Studies, Eye-Tracking, and Physiological Data; Virtual Reality; Virtual Reality and Training; Courses; Industrial Experiences; Interactive Demonstrations; Keynotes; Panels; Posters; and Workshops.Innovative Technologies for Enhancing Experiences and Engagement (SpringerBriefs in Applied Sciences and Technology)
Par Azman Ismail, Fatin Nur Zulkipli, Rahimah Mahat, Mohd Amran Mohd Daril, Andreas Öchsner. 2024
The book showcases how the technologies are transforming entertainment, education, and professional training, offering readers real-world examples of their applications.…
"Innovative Technologies for Enhancing Experiences and Engagement" is an enlightening guide that reveals how emerging technologies are shaping our world, offering insights into the evolving digital landscape and inspiring a future of more personalized, immersive, and engaging experiences.Proceedings of the 2nd International Conference on Internet of Things, Communication and Intelligent Technology (Lecture Notes in Electrical Engineering #1197)
Par Jian Dong, Long Zhang, Deqiang Cheng. 2024
This conference discussed the application of communication and IoT engineering in the era of smart technologies from the perspective of…
disciplinary integration, combining the theory and relevant algorithms of IoT and smart technologies. The book encompasses the entire spectrum of IoT solutions, from IoT to cybersecurity. It explores communication systems, including sixth generation (6G) mobile, D2D and M2M communications. It also focuses on intelligent technologies, especially information systems modeling and simulation. In addition, it explores the areas of pervasive computing, distributed computing, high performance computing, pervasive and mobile computing, and cloud computing.Applied Multi-objective Optimization (Springer Tracts in Nature-Inspired Computing)
Par Nilanjan Dey. 2024
The book explains basic ideas behind several kinds of applied multi-objective optimization and shows how it will be applied in…
practical contexts in the domain of healthcare, engineering design, and manufacturing. The book discusses how meta-heuristic algorithms are successful in resolving challenging, multi-objective optimization issues in various disciplines, including engineering, economics, medical and environmental management. The topic is useful for graduates, researchers and lecturers in optimization, engineering, management science and computer science.Proceedings of Eighth International Congress on Information and Communication Technology: ICICT 2023, London, Volume 4 (Lecture Notes in Networks and Systems #696)
Par Xin-She Yang, R. Simon Sherratt, Nilanjan Dey, Amit Joshi. 2024
This book gathers selected high-quality research papers presented at the Eighth International Congress on Information and Communication Technology, held at…
Brunel University, London, on 20–23 February 2023. It discusses emerging topics pertaining to information and communication technology (ICT) for managerial applications, e-governance, e-agriculture, e-education and computing technologies, the Internet of Things (IoT) and e-mining. Written by respected experts and researchers working on ICT, the book offers a valuable asset for young researchers involved in advanced studies. The work is presented in four volumes.Work Remotely (Penguin Business Experts Series)
Par Anastasia Tohmé, Martin Worner. 2021
Remote working makes us happier, more productive and more profitable, but it can bring its own set of challenges. How…
do we manage our work-life balance; communicate and collaborate effectively as teams; and ensure our technology is efficient?In Work Remotely, Penguin Business Experts Anastasia Tohmé and Martin Worner explain everything you need to know:- Set your own targets and monitor productivity- Establish boundaries between working hours and free time- Manage effective communication and decision-making at a distanceIncluding case studies from the companies around the world who are innovating and revolutionizing the way we work, Work Remotely shares useful advice and practical tips to ensure you get the most out of working away from the office environment.The Trust Manifesto: What you Need to do to Create a Better Internet
Par Damian Bradfield. 2019
From the moment we wake up and unlock our phones, we're producing data. We offer up our unique fingerprint to…
the online world, scan our route to work, listen to a guided meditation or favourite playlist, slide money around, share documents and update our social media accounts. We reach for our phones up to 200 times a day, not knowing which companies are storing, using, selling and manipulating our data. But do we care? We're busy. We've got lives. We're pressed for time! There aren't enough hours in the day to read the terms and conditions. Or, maybe we're happy to trade our personal data for convenient services and to make our lives easier?Big data is the phenomenon of our age, but should we trust it without question? This is the trust dilemma.In 2009, Damian Bradfield founded WeTransfer, the largest file-sharing platform in the world with 50 million global users shipping more than one billion files of data a month. His unique experience of the big data economy has led him to question if there is another way to build the internet, one that is fairer and safer for everyone and, in The Trust Manifesto, he lays out this vision.From Concepts to Code: Introduction to Data Science
Par Adam P. Tashman. 2024
The breadth of problems that can be solved with data science is astonishing, and this book provides the required tools…
and skills fot a broad audience. The reader takes a journey into the forms, uses, and abuses of data and models, and learns how to critically examine each step. Python coding and data analysis skills are built from the ground up, with no prior coding experience assumed. The necessary background in computer science, mathematics, and statistics is provided in an approachable manner.Each step of the machine learning lifecycle is discussed, from business objective planning to monitoring a model in production. This end-to-end approach supplies the broad view necessary to sidestep many of the pitfalls that can sink a data science project. Detailed examples are provided from a wide range of applications and fields, from fraud detection in banking to breast cancer classification in healthcare. The reader will learn the techniques to accomplish tasks that include predicting outcomes, explaining observations, and detecting patterns. Improper use of data and models can introduce unwanted effects and dangers to society. A chapter on model risk provides a framework for comprehensively challenging a model and mitigating weaknesses. When data is collected, stored, and used, it may misrepresent reality and introduce bias. Strategies for addressing bias are discussed. From Concepts to Code: Introduction to Data Science leverages content developed by the author for a full-year data science course suitable for advanced high school or early undergraduate students. This course is freely available and it includes weekly lesson plans.Threat Modeling: Designing for Security
Par Adam Shostack. 2014
The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies…
and Applied Cryptography!Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems security managers, you'll find tools and a framework for structured thinking about what can go wrong. Software developers, you'll appreciate the jargon-free and accessible introduction to this essential skill. Security professionals, you'll learn to discern changing threats and discover the easiest ways to adopt a structured approach to threat modeling. Provides a unique how-to for security and software developers who need to design secure products and systems and test their designs Explains how to threat model and explores various threat modeling approaches, such as asset-centric, attacker-centric and software-centric Provides effective approaches and techniques that have been proven at Microsoft and elsewhere Offers actionable how-to advice not tied to any specific software, operating system, or programming language Authored by a Microsoft professional who is one of the most prominent threat modeling experts in the world As more software is delivered on the Internet or operates on Internet-connected devices, the design of secure software is absolutely critical. Make sure you're ready with Threat Modeling: Designing for Security.Cyber War: The Next Threat to National Security and What to Do About It
Par Richard A. Clarke, Robert K. Knake. 2010
An essential, eye-opening book about cyberterrorism, cyber war, and the next great threat to our national security. “Cyber War may…
be the most important book about national security policy in the last several years.” –SlateFormer presidential advisor and counter-terrorism expert Richard A. Clarke sounds a timely and chilling warning about America’s vulnerability in a terrifying new international conflict. Cyber War is a powerful book about technology, government, and military strategy; about criminals, spies, soldiers, and hackers. It explains clearly and convincingly what cyber war is, and how vulnerable we are as a nation and as individuals to the vast and looming web of cyber criminals.Every concerned American should read this startling and explosive book that offers an insider’s view of White House ‘Situation Room’ operations and carries the reader to the frontlines of our cyber defense. Cyber War exposes a virulent threat to our nation’s security.Entdecken Sie "Enterprise Architektur entschlüsselt: Ein praxisorientierter Leitfaden von den Grundlagen bis zur Anwendung“ von Dennis Suhari, ein praxisorientiertes Werk,…
das die Förderung des Bewusstseins für Enterprise Architektur, die Vermittlung praktischer Erfahrungen und die Unterstützung der Leser bei der erfolgreichen Anwendung ihres Wissens in den Mittelpunkt stellt. Ein Schlüsselelement dieses Buches ist das praxisnahe Fallbeispiel, das einen einzigartigen Einblick in den Aufbau einer Enterprise Architektur von der Geschäfts- über die IT Architektur von Grund auf bietet.Was Sie erwartet:Fundamentale Grundlagen: Ein tiefgreifender Einblick in die essenziellen Grundlagen der Unternehmensarchitektur, um Schlüsselkonzepte und Prinzipien zu vermitteln, die als robuste Basis für die weitere Entwicklung dienen.Modellierung und praktische Tools: Entdecken Sie vielfältige Modellierungsmöglichkeiten und EAM-Tools, die inder Praxis zur Unterstützung der Architekturentwicklung eingesetzt werden.Architekturentwicklung in der Praxis: Anhand des Fallbeispiels der fiktiven Micayu GmbH, basierend auf den umfangreichen Erfahrungen des Autors, erleben Sie die Schritte der Entwicklung einer Unternehmensarchitektur von Grund auf.Zukunftsperspektiven: Ein Ausblick auf die Rolle der Künstlichen Intelligenz und dessen Einfluss auf das Enterprise Architektur ManagementArtificial Intelligence Governance and the Blockchain Revolution (Artificial Intelligence and the Rule of Law)
Par Qiqi Gao, Jiteng Zhang. 2024
This is the first professional academic work in China to discuss artificial intelligence and blockchain together. Artificial intelligence is a…
productivity revolution, and its development has a significant and profound impact on global changes. However, at the same time, its development also brings a series of challenges to human society, such as privacy, security, and fairness issues. Therefore, the significance of blockchain is even more prominent. Blockchain is a revolution in production relations, which will propose important solutions to the challenges of privacy, security, and fairness that arise after the development of artificial intelligence. The book not only discusses the problems currently faced by the development of artificial intelligence, as well as the new opportunities and challenges that artificial intelligence brings to future global governance, but also explains the further development direction of the intelligent revolution from the perspective of blockchain.