|
|
Books > Computing & IT > Applications of computing
Increasingly, human beings are sensors engaging directly with the
mobile Internet. Individuals can now share real-time experiences at
an unprecedented scale. Social Sensing: Building Reliable Systems
on Unreliable Data looks at recent advances in the emerging field
of social sensing, emphasizing the key problem faced by application
designers: how to extract reliable information from data collected
from largely unknown and possibly unreliable sources. The book
explains how a myriad of societal applications can be derived from
this massive amount of data collected and shared by average
individuals. The title offers theoretical foundations to support
emerging data-driven cyber-physical applications and touches on key
issues such as privacy. The authors present solutions based on
recent research and novel ideas that leverage techniques from
cyber-physical systems, sensor networks, machine learning, data
mining, and information fusion.
Across numerous industries in modern society, there is a constant
need to gather precise and relevant data efficiently and quickly.
As such, it is imperative to research new methods and approaches to
increase productivity in these areas. Next-Generation Information
Retrieval and Knowledge Resources Management is a key source on the
latest advancements in multidisciplinary research methods and
applications and examines effective techniques for managing and
utilizing information resources. Featuring extensive coverage
across a range of relevant perspectives and topics, such as
knowledge discovery, spatial indexing, and data mining, this book
is ideally designed for researchers, graduate students, academics,
and industry professionals seeking ways to optimize knowledge
management processes.
Internet usage has become a normal and essential aspect of everyday
life. Due to the immense amount of information available on the
web, it has become obligatory to find ways to sift through and
categorize the overload of data while removing redundant material.
Collaborative Filtering Using Data Mining and Analysis evaluates
the latest patterns and trending topics in the utilization of data
mining tools and filtering practices. Featuring emergent research
and optimization techniques in the areas of opinion mining, text
mining, and sentiment analysis, as well as their various
applications, this book is an essential reference source for
researchers and engineers interested in collaborative filtering.
Hidden semi-Markov models (HSMMs) are among the most important
models in the area of artificial intelligence / machine learning.
Since the first HSMM was introduced in 1980 for machine recognition
of speech, three other HSMMs have been proposed, with various
definitions of duration and observation distributions. Those models
have different expressions, algorithms, computational complexities,
and applicable areas, without explicitly interchangeable forms.
Hidden Semi-Markov Models: Theory, Algorithms and Applications
provides a unified and foundational approach to HSMMs, including
various HSMMs (such as the explicit duration, variable transition,
and residential time of HSMMs), inference and estimation
algorithms, implementation methods and application instances. Learn
new developments and state-of-the-art emerging topics as they
relate to HSMMs, presented with examples drawn from medicine,
engineering and computer science.
In today's digital world, the huge amount of data being generated
is unstructured, messy, and chaotic in nature. Dealing with such
data, and attempting to unfold the meaningful information, can be a
challenging task. Feature engineering is a process to transform
such data into a suitable form that better assists with
interpretation and visualization. Through this method, the
transformed data is more transparent to the machine learning
models, which in turn causes better prediction and analysis of
results. Data science is crucial for the data scientist to assess
the trade-offs of their decisions regarding the effectiveness of
the machine learning model implemented. Investigating the demand in
this area today and in the future is a necessity. The Handbook of
Research on Automated Feature Engineering and Advanced Applications
in Data Science provides an in-depth analysis on both the
theoretical and the latest empirical research findings on how
features can be extracted and transformed from raw data. The
chapters will introduce feature engineering and the recent
concepts, methods, and applications with the use of various data
types, as well as examine the latest machine learning applications
on the data. While highlighting topics such as detection, tracking,
selection techniques, and prediction models using data science,
this book is ideally intended for research scholars, big data
scientists, project developers, data analysts, and computer
scientists along with practitioners, researchers, academicians, and
students interested in feature engineering and its impact on data.
Text analysis tools aid in extracting meaning from digital content.
As digital text becomes more and more complex, new techniques are
needed to understand conceptual structure. Concept Parsing
Algorithms (CPA) for Textual Analysis and Discovery: Emerging
Research and Opportunities provides an innovative perspective on
the application of algorithmic tools to study unstructured digital
content. Highlighting pertinent topics such as semantic tools,
semiotic systems, and pattern detection, this book is ideally
designed for researchers, academics, students, professionals, and
practitioners interested in developing a better understanding of
digital text analysis.
Investments in technologies such as the cloud, the internet of
things (IoT), and robotic process automation are part of a strategy
that helps organizations respond to changing customer demands and
operational challenges. Emerging technologies are becoming one of
the most remarkable elements to be considered in businesses, and
e-businesses are no exception. With the expansion of e-businesses
worldwide, the great population of e-business leaders tends to
increase their knowledge to make future investments in key aspects
and implications of their businesses. Thus, e-business leaders need
to realize and seize existing opportunities for the advancement of
their businesses. Driving Transformative Change in E-Business
Through Applied Intelligence and Emerging Technologies contributes
a comprehensive source to the existing knowledge and research in
the field of e-business and emerging technologies and provides an
understanding to readers about the current concepts, trends,
technologies, and platforms in e-business. Covering topics such as
competitive intelligence, enterprise resource planning systems, and
online crowdfunding, this premier reference source is a
comprehensive resource for business leaders and executives, IT
managers, computer scientists, software engineers, economists,
entrepreneurs, students, researchers, and academicians.
Bio-inspired computation, especially those based on swarm
intelligence, has become increasingly popular in the last decade.
Bio-Inspired Computation in Telecommunications reviews the latest
developments in bio-inspired computation from both theory and
application as they relate to telecommunications and image
processing, providing a complete resource that analyzes and
discusses the latest and future trends in research directions.
Written by recognized experts, this is a must-have guide for
researchers, telecommunication engineers, computer scientists and
PhD students.
INTELLIGENT SECURITY SYSTEMS Dramatically improve your
cybersecurity using AI and machine learning In Intelligent Security
Systems, distinguished professor and computer scientist Dr. Leon
Reznik delivers an expert synthesis of artificial intelligence,
machine learning and data science techniques, applied to computer
security to assist readers in hardening their computer systems
against threats. Emphasizing practical and actionable strategies
that can be immediately implemented by industry professionals and
computer device's owners, the author explains how to install and
harden firewalls, intrusion detection systems, attack recognition
tools, and malware protection systems. He also explains how to
recognize and counter common hacking activities. This book bridges
the gap between cybersecurity education and new data science
programs, discussing how cutting-edge artificial intelligence and
machine learning techniques can work for and against cybersecurity
efforts. Intelligent Security Systems includes supplementary
resources on an author-hosted website, such as classroom
presentation slides, sample review, test and exam questions, and
practice exercises to make the material contained practical and
useful. The book also offers: A thorough introduction to computer
security, artificial intelligence, and machine learning, including
basic definitions and concepts like threats, vulnerabilities,
risks, attacks, protection, and tools An exploration of firewall
design and implementation, including firewall types and models,
typical designs and configurations, and their limitations and
problems Discussions of intrusion detection systems (IDS),
including architecture topologies, components, and operational
ranges, classification approaches, and machine learning techniques
in IDS design A treatment of malware and vulnerabilities detection
and protection, including malware classes, history, and development
trends Perfect for undergraduate and graduate students in computer
security, computer science and engineering, Intelligent Security
Systems will also earn a place in the libraries of students and
educators in information technology and data science, as well as
professionals working in those fields.
"Big data" has become a commonly used term to describe large-scale
and complex data sets which are difficult to manage and analyze
using standard data management methodologies. With applications
across sectors and fields of study, the implementation and possible
uses of big data are limitless. The Handbook of Research on Big
Data Management and Applications explores emerging research on the
ever-growing field of big data and facilitates further knowledge
development on methods for handling and interpreting large data
sets. Providing multi-disciplinary perspectives fueled by
international research, this publication is designed for use by
data analysts, IT professionals, researchers, and graduate-level
students interested in learning about the latest trends and
concepts in big data.
Learning-Based Local Visual Representation and Indexing, reviews
the state-of-the-art in visual content representation and indexing,
introduces cutting-edge techniques in learning based visual
representation, and discusses emerging topics in visual local
representation, and introduces the most recent advances in
content-based visual search techniques.
As digital technology continues to revolutionize the world,
businesses are also evolving by adopting digital technologies such
as artificial intelligence, digital marketing, and analytical
methods into their daily practices. Due to this growing adoption,
further study on the potential solutions modern technology provides
to businesses is required to successfully apply it across
industries. AI-Driven Intelligent Models for Business Excellence
explores various artificial intelligence models and methods for
business applications and considers algorithmic approaches for
business excellence across numerous fields and applications.
Covering topics such as business analysis, deep learning, machine
learning, and analytical methods, this reference work is ideal for
managers, business owners, computer scientists, industry
professionals, researchers, scholars, practitioners, academicians,
instructors, and students.
Communities of Computing is the first book-length history of the
Association for Computing Machinery (ACM), founded in 1947 and with
a membership today of 100,000 worldwide. It profiles ACM's notable
SIGs, active chapters, and individual members, setting ACM's
history into a rich social and political context. The book's 12
core chapters are organized into three thematic sections. "Defining
the Discipline" examines the 1960s and 1970s when the field of
computer science was taking form at the National Science
Foundation, Stanford University, and through ACM's notable efforts
in education and curriculum standards. "Broadening the Profession"
looks outward into the wider society as ACM engaged with social and
political issues - and as members struggled with balancing a focus
on scientific issues and awareness of the wider world. Chapters
examine the social turbulence surrounding the Vietnam War, debates
about the women's movement, efforts for computing and community
education, and international issues including professionalization
and the Cold War. "Expanding Research Frontiers" profiles three
areas of research activity where ACM members and ACM itself shaped
notable advances in computing, including computer graphics,
computer security, and hypertext. Featuring insightful profiles of
notable ACM leaders, such as Edmund Berkeley, George Forsythe, Jean
Sammet, Peter Denning, and Kelly Gotlieb, and honest assessments of
controversial episodes, the volume deals with compelling and
complex issues involving ACM and computing. It is not a narrow
organizational history of ACM committees and SIGS, although much
information about them is given. All chapters are original works of
research. Many chapters draw on archival records of ACM's
headquarters, ACM SIGs, and ACM leaders. This volume makes a
permanent contribution to documenting the history of ACM and
understanding its central role in the history of computing.
The book's core argument is that an artificial intelligence that
could equal or exceed human intelligence-sometimes called
artificial general intelligence (AGI)-is for mathematical reasons
impossible. It offers two specific reasons for this claim: Human
intelligence is a capability of a complex dynamic system-the human
brain and central nervous system. Systems of this sort cannot be
modelled mathematically in a way that allows them to operate inside
a computer. In supporting their claim, the authors, Jobst Landgrebe
and Barry Smith, marshal evidence from mathematics, physics,
computer science, philosophy, linguistics, and biology, setting up
their book around three central questions: What are the essential
marks of human intelligence? What is it that researchers try to do
when they attempt to achieve "artificial intelligence" (AI)? And
why, after more than 50 years, are our most common interactions
with AI, for example with our bank's computers, still so
unsatisfactory? Landgrebe and Smith show how a widespread fear
about AI's potential to bring about radical changes in the nature
of human beings and in the human social order is founded on an
error. There is still, as they demonstrate in a final chapter, a
great deal that AI can achieve which will benefit humanity. But
these benefits will be achieved without the aid of systems that are
more powerful than humans, which are as impossible as AI systems
that are intrinsically "evil" or able to "will" a takeover of human
society.
CORPORATE CYBERSECURITY An insider's guide showing companies how to
spot and remedy vulnerabilities in their security programs A bug
bounty program is offered by organizations for people to receive
recognition and compensation for reporting bugs, especially those
pertaining to security exploits and vulnerabilities. Corporate
Cybersecurity gives cyber and application security engineers (who
may have little or no experience with a bounty program) a hands-on
guide for creating or managing an effective bug bounty program.
Written by a cyber security expert, the book is filled with the
information, guidelines, and tools that engineers can adopt to
sharpen their skills and become knowledgeable in researching,
configuring, and managing bug bounty programs. This book addresses
the technical aspect of tooling and managing a bug bounty program
and discusses common issues that engineers may run into on a daily
basis. The author includes information on the often-overlooked
communication and follow-through approaches of effective
management. Corporate Cybersecurity provides a much-needed resource
on how companies identify and solve weaknesses in their security
program. This important book: Contains a much-needed guide aimed at
cyber and application security engineers Presents a unique
defensive guide for understanding and resolving security
vulnerabilities Encourages research, configuring, and managing
programs from the corporate perspective Topics covered include bug
bounty overview; program set-up; vulnerability reports and
disclosure; development and application Security Collaboration;
understanding safe harbor and SLA Written for professionals working
in the application and cyber security arena, Corporate
Cybersecurity offers a comprehensive resource for building and
maintaining an effective bug bounty program.
Since its first volume in 1960, Advances in Computers has presented
detailed coverage of innovations in computer hardware, software,
theory, design, and applications. It has also provided contributors
with a medium in which they can explore their subjects in greater
depth and breadth than journal articles usually allow. As a result,
many articles have become standard references that continue to be
of significant, lasting value in this rapidly expanding field.
Interfaces within computers, computing, and programming are
consistently evolving and continue to be relevant to computer
science as it progresses. Advancements in human-computer
interactions, their aesthetic appeal, ease of use, and learnability
are made possible due to the creation of user interfaces and result
in further growth in science, aesthetics, and practical
applications. Interface Support for Creativity, Productivity, and
Expression in Computer Graphics is a collection of innovative
research on usability, the apps humans use, and their sensory
environment. While highlighting topics such as image datasets,
augmented reality, and visual storytelling, this book is ideally
designed for researchers, academicians, graphic designers,
programmers, software developers, educators, multimedia
specialists, and students seeking current research on uniting
digital content with the physicality of the device through
applications, thus addressing sensory perception.
Artificial intelligence has been utilized in a diverse range of
industries as more people and businesses discover its many uses and
applications. A current field of study that requires more
attention, as there is much opportunity for improvement, is the use
of artificial intelligence within literary works and social media
analysis. Artificial Intelligence Applications in Literary Works
and Social Media presents contemporary developments in the adoption
of artificial intelligence in textual analysis of literary works
and social media and introduces current approaches, techniques, and
practices in data science that are implemented to scrap and analyze
text data. This book initiates a new multidisciplinary field that
is the combination of artificial intelligence, data science, social
science, literature, and social media study. Covering key topics
such as opinion mining, sentiment analysis, and machine learning,
this reference work is ideal for computer scientists, industry
professionals, researchers, scholars, practitioners, academicians,
instructors, and students.
Digital image processing is a field that is constantly improving.
Gaining high-level understanding from digital images is a key
requirement for computing. One aspect of study that is assisting
with this advancement is fractal theory. This new science has
gained momentum and popularity as it has become a key topic of
research in the area of image analysis. Examining Fractal Image
Processing and Analysis is an essential reference source that
discusses fractal theory applications and analysis, including
box-counting analysis, multi-fractal analysis, 3D fractal analysis,
and chaos theory, as well as recent trends in other soft computing
techniques. Featuring research on topics such as image compression,
pattern matching, and artificial neural networks, this book is
ideally designed for system engineers, computer engineers,
professionals, academicians, researchers, and students seeking
coverage on problem-oriented processing techniques and imaging
technologies.
|
|