Résultats de recherche de titre
Articles 1 à 20 sur 4043
AI Applications to Communications and Information Technologies: The Role of Ultra Deep Neural Networks
Par Daniel Minoli, Benedict Occhiogrosso. 2024
AI Applications to Communications and Information Technologies Apply the technology of the future to networking and communications. Artificial intelligence, which…
enables computers or computer-controlled systems to perform tasks which ordinarily require human-like intelligence and decision-making, has revolutionized computing and digital industries like few other developments in recent history. Tools like artificial neural networks, large language models, and deep learning have quickly become integral aspects of modern life. With research and development into AI technologies proceeding at lightning speeds, the potential applications of these new technologies are all but limitless. AI Applications to Communications and Information Technologies offers a cutting-edge introduction to AI applications in one particular set of disciplines. Beginning with an overview of foundational concepts in AI, it then moves through numerous possible extensions of this technology into networking and telecommunications. The result is an essential introduction for researchers and for technology undergrad/grad student alike. AI Applications to Communications and Information Technologies readers will also find: In-depth analysis of both current and evolving applications Detailed discussion of topics including generative AI, chatbots, automatic speech recognition, image classification and recognition, IoT, smart buildings, network management, network security, and more An authorial team with immense experience in both research and industry AI Applications to Communications and Information Technologies is ideal for researchers, industry observers, investors, and advanced students of network communications and related fields.Training Data for Machine Learning
Par Anthony Sarkis. 2024
Your training data has as much to do with the success of your data project as the algorithms themselves because…
most failures in AI systems relate to training data. But while training data is the foundation for successful AI and machine learning, there are few comprehensive resources to help you ace the process. In this hands-on guide, author Anthony Sarkis--lead engineer for the Diffgram AI training data software--shows technical professionals, managers, and subject matter experts how to work with and scale training data, while illuminating the human side of supervising machines. Engineering leaders, data engineers, and data science professionals alike will gain a solid understanding of the concepts, tools, and processes they need to succeed with training data.With this book, you'll learn how to:Work effectively with training data including schemas, raw data, and annotationsTransform your work, team, or organization to be more AI/ML data-centricClearly explain training data concepts to other staff, team members, and stakeholdersDesign, deploy, and ship training data for production-grade AI applicationsRecognize and correct new training-data-based failure modes such as data biasConfidently use automation to more effectively create training dataSuccessfully maintain, operate, and improve training data systems of record6G is currently under definition, being often addressed from a plain telecommunications perspective as an evolutionary paradigm that represents an…
extension of 5G. Having as a horizon 2030, 6G initiatives are being deployed across the globe to further ignite the development of 6G services. At its philosophical core, 6G embodies the "human in the loop" principle. The research effort being developed towards 6G requires an interdisciplinary approach that ignites discussion across different key technological sectors, ranging from communications up to services and business cases. The contributions of this book to research in the field concern an evolutionary and interdisciplinary design of 6G as a paradigm that can be addressed by working together four different computational areas: communications; satellites and navigation; sensing; services. The book is derived from initial brainstorming that was developed during the 11th CONASENSE Symposium held in October 2021 in fortiss, Munich, Germany. Several international experts contribute to an overview of 6G key challenges, new networking trends and challenges to be overcome, and advanced 6G services. The book starts with a perspective on 6G challenges and use-cases beyond the 2030 horizon, to then continue to address the role of non-terrestrial networks and cognitive, service-centric satellite networks in future 6G services. Still with focus on 6G adaptive networking, the book continues with a debate on the need to integrate social awareness based on an interdisciplinary approach in network operations. Then, specific examples of advanced services (quantum imaging and holography; localization of the Internet of remote things) are discussed. The book is, therefore, intended to assist in developing critical thinking to back up novel networking, applications, and services towards 6G.Technology in Education. Innovative Practices for the New Normal: 6th International Conference on Technology in Education, ICTE 2023, Hong Kong, China, December 19–21, 2023, Proceedings (Communications in Computer and Information Science #1974)
Par Kam Cheong Li, Fu Lee Wang, Simon K. S. Cheung, Kongkiti Phusavat, Naraphorn Paoprasert, Peerayuth Charnsethikul. 2024
This book constitutes the refereed proceedings of the 6th International Conference on Technology in Education. Innovations for Online Teaching and Learning, ICTE…
2023, held in Hong Kong, China, during December 19–21, 2023.The 30 full papers included in this book were carefully reviewed and selected from 74 submissions. They were organized in topical sections as follows: keynote papers; online and innovative learning; personalized and individualized learning; smart learning environment; artificial intelligence in education; and institutional strategies and practices.Advances in Soft Computing: 22nd Mexican International Conference on Artificial Intelligence, MICAI 2023, Yucatán, Mexico, November 13–18, 2023, Proceedings, Part II (Lecture Notes in Computer Science #14392)
Par Hiram Calvo, Lourdes Martínez-Villaseñor, Hiram Ponce. 2024
The two-volume set LNAI 14391 and 14392 constitutes the proceedings of the 22nd Mexican International Conference on Artificial Intelligence, MICAI…
2023, held in Yucatán, Mexico, in November 2023.The total of 49 papers presented in these two volumes was carefully reviewed and selected from 115 submissions.The proceedings of MICAI 2023 are published in two volumes. The first volume, Advances in Computational Intelligence, contains 24 papers structured into three sections:– Machine Learning– Computer Vision and Image Processing– Intelligent SystemsThe second volume, Advances in Soft Computing, contains 25 papers structured into three sections:– Natural Language Processing– Bioinformatics and Medical Applications– Robotics and ApplicationsArtificial Life and Evolutionary Computation: 16th Italian Workshop, WIVACE 2022, Gaeta, Italy, September 14–16, 2022, Revised Selected Papers (Communications in Computer and Information Science #1780)
Par Leonardo Vanneschi, Claudio De Stefano, Francesco Fontanella. 2023
This book constitutes the refereed proceedings of the 16th Italian Workshop on Artificial Life and Evolutionary Computation, WIVACE 2022, held…
in Gaeta, Italy, during September 14–16, 2022. The 21 full papers and 3 short papers included in this book were carefully reviewed and selected from 45 submissions. They were organized in topical sections as follows: answer set programming; networks and complex systems, metaheuristics, robotics, and machine learningCyber Malware: Offensive and Defensive Systems (Security Informatics and Law Enforcement)
Par Leandros A. Maglaras, Iman Almomani, Mohamed Amine Ferrag, Nick Ayres. 2024
This book provides the foundational aspects of malware attack vectors and appropriate defense mechanisms against malware. The book equips readers…
with the necessary knowledge and techniques to successfully lower the risk against emergent malware attacks. Topics cover protections against malware using machine learning algorithms, Blockchain and AI technologies, smart AI-based applications, automated detection-based AI tools, forensics tools, and much more. The authors discuss theoretical, technical, and practical issues related to cyber malware attacks and defense, making it ideal reading material for students, researchers, and developers.Frontiers of Supercomputing II: A National Reassessment (Los Alamos Series in Basic and Applied Sciences #13)
Par Karyn R. Ames, Alan Brenner. 2023
This uniquely comprehensive book brings together the vast amount of technical, economic, and political information and the analyses of supercomputing…
that have hitherto been buried in the frequently inaccessible "gray literature." Seventy-nine distinguished participants in the second Frontiers of Supercomputing conference offer perceptive and often controversial views on the emerging computing environment in the United States. This title is part of UC Press's Voices Revived program, which commemorates University of California Press’s mission to seek out and cultivate the brightest minds and give them voice, reach, and impact. Drawing on a backlist dating to 1893, Voices Revived makes high-quality, peer-reviewed scholarship accessible once again using print-on-demand technology. This title was originally published in 1994.Hybrid Threats, Cyberterrorism and Cyberwarfare
Par Helge Janicke, Ioanna Kantzavelou, Leandros Maglaras, Mohamed Amine Ferrag. 2024
Nowadays, in Cyberspace there is a burst of information that everyone has access. However, apart from the advantages the Internet…
offers, it also hides numerous dangers for both people and nations. Cyberspace has a dark side, including terrorism, bullying, and other types of violence. Cyberwarfare is a kind of virtual war that causes the same destruction that a physical war would also do. A hybrid threat is an umbrella term, encompassing a wide variety of existing adverse circumstances and actions, such as terrorism, migration, piracy, corruption, ethnic conflict etc and is not exclusively a tool of asymmetric or non-state actors, but can be applied by state and non-state actors alike. ‘Cyber-conflict’ and ‘cyber-war’ serve as examples of the use of new technologies within the scope of hybrid threats. Cyber-war basically refers to a sustained computer-based cyber-attack by a state against the IT infrastructure of a target state. On the other hand cyber-security is a major factor that shapes productivity and efficiency of the modern industry in both technical and economic terms. The book discusses and analyses current posture of cyberterrorism, cyberwarfare, and hybrid threats, sector specific cyber-attacks that have the form of cyberterrorism and presents the recent actions that EU, USA and other Nations have taken in order to strengthen their systems against such attacks. There has never been a higher risk of a major catastrophe as a result of the rise in offensive cyber activity, particularly the possibility of cyber-physical strikes against critical services. Recent cyber-attacks against critical infrastructures along with the continuous migration crisis have been the main driving forces that led to the decision to publish this book.The Science of Esports
Par Matthew Watson, Craig McNulty, Remco Polman, Kabir Bubna. 2024
The Science of Esports draws from contemporary research and coach expertise to examine esports athlete health and performance from a…
range of disciplinary perspectives, including physiology, psychology, sociology, and nutrition. The rapid expansion of the esports industry has elevated competitive video gaming into the realm of high performance, requiring players, coaches, and practitioners to implement interdisciplinary approaches to performance support. The book covers key topic areas such as: What esports is and similarities and differences to sport Game-specific training Physiological and psychological consideration for esports athletes Social aspects of player performance and the social environment of esports Esports coaching and structure of esports performance environments Technology and its use in esports Safeguarding, cheating, and gambling This book includes worked examples and case studies to allow immediate implementation into practice for esports athletes and coaches. It summarises the current state of research to inform researchers and identify gaps in knowledge. This book is critical reading for students of esports and related courses. It serves as the first scientific resource designed to provide athletes, coaches, and practitioners with interdisciplinary insights into esports health and performance.Information and Communications Technologies for Smart Cities and Societies (The City Project #5)
Par Roberto Menozzi. 2024
This book offers an overview of digital, IoT and intelligent technologies, applications and solutions that are contributing to shape the…
digital, inclusive, and sustainable transformation of contemporary cities. Based on peer-reviewed contributions to the workshop "Information and Communications Technologies for Smart Cities and Societies", held on December 2, 2022, at the University of Parma, Italy, it offers a multidisciplinary, authoritative snapshot for researchers, architects, and engineers, as well as professionals and policy makers, involved in planning the city of the future. The book describes practical case studies, discussing challenges and opportunities of the integration of ICTs in the planning and management of future cities.Solvable Cellular Automata: Methods and Applications (Understanding Complex Systems)
Par Henryk Fukś. 2023
The main focus of the book is solvability of cellular automata, that is, expressing the state of a given cell…
after a given number of steps by an explicit formula. The author considers solutions of two types of initial value problems for cellular automata, the deterministic one and the probabilistic one. In the first chapter the basic concepts of cellular automata theory are introduced. Deterministic initial value problem is introduced next and solutions for selected simple rules are also presented. In the following chapters various techniques for solving the deterministic problem are introduced, using elementary CA rules of increasing complexity as examples. The second part of the book introduces the concept of probability measure in the context of cellular automata and the probabilistic initial value problem for both deterministic and probabilistic rules. The book is amply illustrated with examples and applications such as the density classification problem, phase transitions in traffic models or the diffusion of innovations model. In the appendix, solution formulae (both deterministic and probabilistic) for over 60 elementary cellular automata rules are listed. Ruelle-Frobenius-Perron equations for all 88 minimal elementary cellular automata are also provided.Development of Safety-Critical Systems: Architecture and Software
Par Gopinath Karmakar, Amol Wakankar, Ashutosh Kabra, Paritosh Pandya. 2023
This book provides professionals and students with practical guidance for the development of safety-critical computer-based systems. It covers important aspects…
ranging from complying with standards and guidelines to the necessary software development process and tools, and also techniques pertaining to model-based application development platforms as well as qualified programmable controllers.After a general introduction to the book’s topic in chapter 1, chapter 2 discusses dependability aspects of safety systems and how architectural design at the system level helps deal with failures and yet achieves the targeted dependability attributes. Chapter 3 presents the software development process which includes verification and validation at every stage, essential to the development of software for systems performing safety functions. It also explains how the process helps in developing a safety case that can be independently verified and validated. The subsequent chapter 4 presents some important standards and guidelines, which apply to different industries and in different countries. Chapter 5 then discusses the steps towards complying with the standards at every phase of development. It offers a guided tour traversing the path of software qualification by exploring the necessary steps towards achieving the goal with the help of case studies. Chapter 6 highlights the application of formal methods for the development of safety systems software and introduces some available notations and tools which assist the process. Finally, chapter 7 presents a detailed discussion on the importance and the advantages of qualified platforms for safety systems application development, including programmable controller (PLC) and formal model-based development platforms. Each chapter includes case studies illustrating the subject matter.The book is aimed at both practitioners and students interested in the art and science of developing computer-based systems for safety-critical applications. Both audiences will get insights into the tools and techniques along with the latest developments in the design, analysis and qualification, which are constrained by the regulatory and compliance requirements mandated by the applicable guides and standards. It also addresses the needs of professionals and young graduates who specialize in the development of necessary tools and qualified platforms.Artificial Intelligence in Cyber Security: Theories and Applications (Intelligent Systems Reference Library #240)
Par Steven Lawrence Fernandes, Tarun Kumar Sharma, Tushar Bhardwaj, Himanshu Upadhyay. 2023
This book highlights the applications and theory of artificial intelligence in the domain of cybersecurity. The book proposes new approaches…
and ideas to present applications of innovative approaches in real-time environments. In the past few decades, there has been an exponential rise in the application of artificial intelligence technologies (such as deep learning, machine learning, blockchain) for solving complex and intricate problems arising in the domain of cybersecurity. The versatility of these techniques has made them a favorite among scientists and researchers working in diverse areas. This book serves as a reference for young scholars, researchers, and industry professionals working in the field of Artificial Intelligence and Cybersecurity.Artificial Life and Evolutionary Computation: 14th Italian Workshop, WIVACE 2019, Rende, Italy, September 18–20, 2019, Revised Selected Papers (Communications in Computer and Information Science #1200)
Par Antonio Guerrieri, Clara Pizzuti, Giandomenico Spezzano, Franco Cicirelli, Andrea Vinci, Annalisa Socievole. 2020
This book constitutes the revised selected papers of the 14th Italian Workshop on Artificial Life and Evolutionary Computation, WIVACE 2019,…
held in Rende, Italy, in September 2019.The 13 full papers and 4 short paper presented were thoroughly reviewed and selected from 31 submissions. They are focused on the topics of information systems, design and analysis of algorithms, artificial intelligence, machine learning, cognitive science, modeling and simulation, collaborative and social computing, parallel computing, distributed computing. The chapter “Nestedness Temperature in the Agent-Artifact Space: Emergence of Hierarchical Order in the 2000-2014 Photonics Techno-Economic Complex System” is available open access under a CC BY 4.0 license.Mobile Web and Intelligent Information Systems: 19th International Conference, MobiWIS 2023, Marrakech, Morocco, August 14–16, 2023, Proceedings (Lecture Notes in Computer Science #13977)
Par Muhammad Younas, Irfan Awan, Tor-Morten Grønli. 2023
This book constitutes the refereed proceedings of the 19th International Conference on Mobile Web and Intelligent Information Systems, MobiWIS 2023,…
held in Marrakech, Morocco, during August 14–16, 2023.The 18 full papers and 1 short papers presented in this book were carefully reviewed and selected from 54 submissions. The papers are divided into the following topical sections: smart and intelligent systems; digital systems in healthcare services; SDN, IoT and edge computing; mobile interfaces and interactivity; machine learning and stochastic methods; and advanced mobile applications.Algorithmic Discrimination and Ethical Perspective of Artificial Intelligence (Accounting, Finance, Sustainability, Governance & Fraud: Theory and Application)
Par Sezer Bozkuş Kahyaoğlu, Muharrem Kılıç. 2024
This book delves into the complex intersection between artificial intelligence and human rights violations, shedding light on the far-reaching implications…
within the framework of discrimination and the pivotal role equality bodies play in combatting these issues. Through a collaborative effort between the Human Rights and Equality Institution of Türkiye (HREIT) and Hasan Kalyoncu University, the groundbreaking "International Symposium on the Effects of Artificial Intelligence in the Context of the Prohibition of Discrimination" took place on March 30, 2022, in Gaziantep. This book is the outcome of this symposium, bringing attention to the alarming issues of "bias and discrimination" prevalent in the application of artificial intelligence. With a commitment to Sustainable Development Goal 8.10 of safeguarding human rights in the digital realm and countering the adverse effects of artificial intelligence, this work is an essential contribution to the Human Rights Action Plan. Comprising an array of insightful chapters, this book offers an in-depth exploration of artificial intelligence technologies, encompassing a broad spectrum of topics ranging from data protection to algorithmic discrimination, the deployment of artificial intelligence in criminal proceedings to combating hate speech, and from predictive policing to meta-surveillance. It aims to serve as a call to action, urging societies and policymakers to acknowledge the potential threats posed by AI and recognize the need for robust legislative frameworks and ethical principles to ensure that international standards on human rights are upheld in the face of technological advancements.This book constitutes the refereed proceedings of the 21st International Symposium on Automated Technology for Verification and Analysis, ATVA 2023,…
held in Singapore, in October 2023. The symposium intends to promote research in theoretical and practical aspects of automated analysis, verification and synthesis by providing a forum for interaction between regional and international research communities and industry in related areas. The 30 regular papers presented together with 7 tool papers were carefully reviewed and selected from 150 submissions.The papers are divided into the following topical sub-headings: Temporal logics, Data structures and heuristics, Verification of programs and hardware.Advances in Quantitative Ethnography: 5th International Conference, ICQE 2023, Melbourne, VIC, Australia, October 8–12, 2023, Proceedings (Communications in Computer and Information Science #1895)
Par Golnaz Arastoopour Irgens, Simon Knight. 2023
This book constitutes the refereed proceedings of the 5th International Conference on Advances in Quantitative Ethnography, ICQE 2023, held in Melbourne,…
VIC, Australia, during October 8–12, 2023.The 33 full papers included in this book were carefully reviewed and selected from 39 submissions. They were organized in topical sections as follows: understanding learners and learning; society, culture, identity, and justice; and advances in QE methodologies.Uncertainty and Imprecision in Decision Making and Decision Support - New Advances, Challenges, and Perspectives: Selected Papers from BOS/SOR-2022, Held on October 13-15, 2022, and IWIFSGN-2022, Held on October 13-14, 2022, in Warsaw, Poland (Lecture Not
Par Krassimir T. Atanassov, Janusz Kacprzyk, Sławomir Zadrożny, Jan W. Owsiński, Maciej Krawczak, Evdokia Sotirova, Eulalia Szmidt, Andrzej Kałuszko, Vassia Atanassova, Sotir S. Sotirov. 2023
This volume is composed of selected papers from two conferences held in Warsaw, Poland on October 13-15, 2022: the BOS/SOR’2022…
- National Conference on Operational and Systems Research, one of premiere conferences in the field of operational and systems research, and the Twentith International Workshop on Intuitionistic Fuzzy Sets and Generalized Nets, IWIFSGN-2022, one of premiere conferences on fuzzy logic, notably on extensions of the traditional fuzzy sets, also comprising a considerable part on the Generalized Nets (GNs). A joint publication of selected papers from the two conferences follows a long tradition of such a joint organization, and – from a substantial point of view – combines systems modeling, systems analysis, broadly perceived operational research, notably optimization, decision making and decision support, with various aspects of uncertain and imprecise information and their related tools and techniques.