![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer programming
Research on ontology is becoming increasingly widespread in the computer science community. While this term has been rather confined to the philosophical sphere in the past, it is now gaining a specific role in areas such as Artificial Intelligence, Computational Linguistics, and Databases. Its importance has been recognized in fields as diverse as knowledge engineering, knowledge representation, qualitative modeling, language engineering, database design, information integration, object-oriented analysis, information retrieval and extraction, knowledge management and organization, agent-based systems design. Current applications areas are disparate, including enterprise integration, natural language translation, medicine, mechanical engineering, electronic commerce, geographic information systems, legal information systems, and biological information systems. Various workshops addressing the engineering aspects of ontology have been held in the recent years. However, ontology by 'its very nature' ought to be a unifying discipline. Insights in this field have potential impact on the whole area of information systems (taking this term in its broadest sense), as testified by the interest recently shown by international standards organizations. In order to provide a solid general foundation for this work, it is therefore important to focus on the common scientific principles and open problems arising from current tools, methodologies, and applications of ontology.
A Deep Dive into NoSQL Databases: The Use Cases and Applications, Volume 109, the latest release in the Advances in Computers series first published in 1960, presents detailed coverage of innovations in computer hardware, software, theory, design and applications. In addition, it provides contributors with a medium in which they can explore their subjects in greater depth and breadth. This update includes sections on NoSQL and NewSQL databases for big data analytics and distributed computing, NewSQL databases and scalable in-memory analytics, NoSQL web crawler application, NoSQL Security, a Comparative Study of different In-Memory (No/New)SQL Databases, NoSQL Hands On-4 NoSQLs, the Hadoop Ecosystem, and more.
As both intelligence and software science revolutionizes the modern world, the contributions that each make to the other combine into a new transdisciplinary field. Breakthroughs in Software Science and Computational Intelligence charts the new ground broken by researchers exploring these two disciplines. A vital resource to students and practitioners working in computer science, theoretical software engineering, cognitive science, cognitive informatics, and intelligence science, this book establishes itself in this new field, emphasizing the abundance of future applications and advancement.
With complex systems and complex requirements being a challenge that designers must face to reach quality results, multi-formalism modeling offers tools and methods that allow modelers to exploit the benefits of different techniques in a general framework intended to address these challenges. Theory and Application of Multi-Formalism Modeling boldly explores the importance of this topic by gathering experiences, theories, applications, and solutions from diverse perspectives of those involved with multi-formalism modeling. Professionals, researchers, academics, and students in this field will be able to critically evaluate the latest developments and future directions of multi-formalism research.
This unique volume reviews the latest advances in domain adaptation in the training of machine learning algorithms for visual understanding, offering valuable insights from an international selection of experts in the field. The text presents a diverse selection of novel techniques, covering applications of object recognition, face recognition, and action and event recognition. Topics and features: reviews the domain adaptation-based machine learning algorithms available for visual understanding, and provides a deep metric learning approach; introduces a novel unsupervised method for image-to-image translation, and a video segment retrieval model that utilizes ensemble learning; proposes a unique way to determine which dataset is most useful in the base training, in order to improve the transferability of deep neural networks; describes a quantitative method for estimating the discrepancy between the source and target data to enhance image classification performance; presents a technique for multi-modal fusion that enhances facial action recognition, and a framework for intuition learning in domain adaptation; examines an original interpolation-based approach to address the issue of tracking model degradation in correlation filter-based methods. This authoritative work will serve as an invaluable reference for researchers and practitioners interested in machine learning-based visual recognition and understanding.
These contributions, written by the foremost international researchers and practitioners of Genetic Programming (GP), explore the synergy between theoretical and empirical results on real-world problems, producing a comprehensive view of the state of the art in GP. Chapters in this volume include: Similarity-based Analysis of Population Dynamics in GP Performing Symbolic Regression Hybrid Structural and Behavioral Diversity Methods in GP Multi-Population Competitive Coevolution for Anticipation of Tax Evasion Evolving Artificial General Intelligence for Video Game Controllers A Detailed Analysis of a PushGP Run Linear Genomes for Structured Programs Neutrality, Robustness, and Evolvability in GP Local Search in GP PRETSL: Distributed Probabilistic Rule Evolution for Time-Series Classification Relational Structure in Program Synthesis Problems with Analogical Reasoning An Evolutionary Algorithm for Big Data Multi-Class Classification Problems A Generic Framework for Building Dispersion Operators in the Semantic Space Assisting Asset Model Development with Evolutionary Augmentation Building Blocks of Machine Learning Pipelines for Initialization of a Data Science Automation Tool Readers will discover large-scale, real-world applications of GP to a variety of problem domains via in-depth presentations of the latest and most significant results.
ISO 9001 is known throughout the world as the gold standard for quality process improvement, but quality assurances experts are also discovering the power of CMMI (Capability Maturity Model Integration). This text explores how these two models can be used together to improve process quality by quantum leaps. It shows how organizations can streamline their quality process improvement programmes by capitalizing on the similarities both models share while minimizing their differences. The authors demonstrate that organizations can save valuable resources and money as they improve quality by moving towards both ISO 9001:2000 and CMMI compliance certification.
This book collects high-quality research papers presented at the International Conference on Computing Applications in Electrical & Electronics Engineering, held at Rajkiya Engineering College, Sonbhadra, India, on August 30-31, 2019. It provides novel contributions in computational intelligence, together with valuable reference material for future research. The topics covered include: big data analytics, IoT and smart infrastructures, machine learning, artificial intelligence and deep learning, crowd sourcing and social intelligence, natural language processing, business intelligence, high-performance computing, wireless, mobile and green communications, ad-hoc, sensor and mesh networks, SDN and network virtualization, cognitive systems, swarm intelligence, human-computer interaction, network and information security, intelligent control, soft computing, networked control systems, renewable energy sources and technologies, biomedical signal processing, pattern recognition and object tracking, and sensor devices and applications.
Whether searching, shopping, or socializing, Web users leave behind a great deal of data revealing their information needs, mindset, and approaches used, creating vast opportunities for Web service providers as well as a host of security and privacy concerns for consumers. The Handbook of Research on Web Log Analysis reflects on the multifaceted themes of Web use and presents various approaches to log analysis. This expansive collection reviews the history of Web log analysis and examines new trends including the issues of privacy, social interaction and community building. Over XX research contributions from XX international experts comprehensively cover the latest user-behavior analytic and log analysis methodologies, and consider new research directions and novel applications. An essential holding for library reference collections, this Handbook of Research will benefit academics, researchers, and students in a variety of fields, as well as technology professionals interested in the opportunities and challenges presented by the massive collection of Web usage data.
As semantic technologies prove their value with targeted applications, there are increasing opportunities to consider their usefulness in social contexts for knowledge, learning, and human development. ""Social Web Evolution: Integrating Semantic Applications and Web 2.0 Technologies"" explores the potential of Web 2.0 and its synergies with the Semantic Web and provides state-of-the-art theoretical foundations and technological applications. A reference edition for academicians, practitioners, policy makers, and government officers eager for knowledge on Web 2.0 and social Web, this book emphasizes practical aspects of the integration of semantic applications into social Web technologies.
This book focuses on the design, implementation and applications of embedded systems and advanced industrial controls with microcontrollers. It combines classical and modern control theories as well as practical control programming codes to help readers learn control techniques easily and effectively. The book covers both linear and nonlinear control techniques to help readers understand modern control strategies. The author provides a detailed description of the practical considerations and applications in linear and nonlinear control systems. They concentrate on the ARM (R) Cortex (R)-M4 MCU system built by Texas Instruments (TM) called TM4C123GXL, in which two ARM (R) Cortex (R)-M4 MCUs, TM4C123GH6PM, are utilized. In order to help the reader develop and build application control software for a specified microcontroller unit. Readers can quickly develop and build their applications by using sample project codes provided in the book to access specified peripherals. The book enables readers to transfer from one interfacing protocol to another, even if they only have basic and fundamental understanding and basic knowledge of one interfacing function. Classical and Modern Controls with Microcontrollers is a powerful source of information for control and systems engineers looking to expand their programming knowledge of C, and of applications of embedded systems with microcontrollers. The book is a textbook for college students majored in CE, EE and ISE to learn and study classical and modern control technologies. The book can also be adopted as a reference book for professional programmers working in modern control fields or related to intelligent controls and embedded computing and applications. Advances in Industrial Control reports and encourages the transfer of technology in control engineering. The rapid development of control technology has an impact on all areas of the control discipline. The series offers an opportunity for researchers to present an extended exposition of new work in all aspects of industrial control.
Other books on the market have explored the principles of software configuration management (SCM), but none have tackled the nuts-and-bolts of implementing an SCM system - until now. This completely revised edition of an Artech House bestseller goes far above and beyond other SCM books as the only complete guide that integrates SCM principles, advanced topics, and implementation procedures in one easy-access resource. The second edition is greatly expanded with new chapters on documentation control, product data management, and SCM standards, and explroes the latest advances in SCM tools, organization, operation, and maintenance as well as new software development methodologies.
Artificial intelligence (AI) has become pervasive in most areas of research and applications. While computation can significantly reduce mental efforts for complex problem solving, effective computer algorithms allow continuous improvement of AI tools to handle complexity-in both time and memory requirements-for machine learning in large datasets. Meanwhile, data science is an evolving scientific discipline that strives to overcome the hindrance of traditional skills that are too limited to enable scientific discovery when leveraging research outcomes. Solutions to many problems in medicine and life science, which cannot be answered by these conventional approaches, are urgently needed for society. This edited book attempts to report recent advances in the complementary domains of AI, computation, and data science with applications in medicine and life science. The benefits to the reader are manifold as researchers from similar or different fields can be aware of advanced developments and novel applications that can be useful for either immediate implementations or future scientific pursuit. Features: Considers recent advances in AI, computation, and data science for solving complex problems in medicine, physiology, biology, chemistry, and biochemistry Provides recent developments in three evolving key areas and their complementary combinations: AI, computation, and data science Reports on applications in medicine and physiology, including cancer, neuroscience, and digital pathology Examines applications in life science, including systems biology, biochemistry, and even food technology This unique book, representing research from a team of international contributors, has not only real utility in academia for those in the medical and life sciences communities, but also a much wider readership from industry, science, and other areas of technology and education.
Recent advancements have put Gaming and Computer-Mediated Simulations at the forefront of technology and learning. A closer look at these topic areas opens the door for development and innovation and the implications that go with it. Discoveries in Gaming and Computer-Mediated Simulations: New Interdisciplinary Applications explores and promotes a deep conceptual and empirical understanding of the roles of electronic games and computer-mediated simulations across multiple disciplines. This book helps build a significant bridge between research and practice on electronic gaming and simulations, supporting the work of researchers, practitioners, and policymakers. Drawing on history allows this publication to help move this field forward.
Mapping and localization are two essential tasks in autonomous mobile robotics. Due to the unavoidable noise that sensors present, mapping algorithms usually rely on loop closure detection techniques, which entail the correct identification of previously seen places to reduce the uncertainty of the resulting maps. This book deals with the problem of generating topological maps of the environment using efficient appearance-based loop closure detection techniques. Since the quality of a visual loop closure detection algorithm is related to the image description method and its ability to index previously seen images, several methods for loop closure detection adopting different approaches are developed and assessed. Then, these methods are used in three novel topological mapping algorithms. The results obtained indicate that the solutions proposed attain a better performance than several state-of-the-art approaches. To conclude, given that loop closure detection is also a key component in other research areas, a multi-threaded image mosaicing algorithm is proposed. This approach makes use of one of the loop closure detection techniques previously introduced in order to find overlapping pairs between images and finally obtain seamless mosaics of different environments in a reasonable amount of time.
Sir Tony Hoare has had an enormous influence on computer science, from the Quicksort algorithm to the science of software development, concurrency and program verification. His contributions have been widely recognised: He was awarded the ACM's Turing Award in 1980, the Kyoto Prize from the Inamori Foundation in 2000, and was knighted for "services to education and computer science" by Queen Elizabeth II of England in 2000. This book presents the essence of his various works-the quest for effective abstractions-both in his own words as well as chapters written by leading experts in the field, including many of his research collaborators. In addition, this volume contains biographical material, his Turing award lecture, the transcript of an interview and some of his seminal papers. Hoare's foundational paper "An Axiomatic Basis for Computer Programming", presented his approach, commonly known as Hoare Logic, for proving the correctness of programs by using logical assertions. Hoare Logic and subsequent developments have formed the basis of a wide variety of software verification efforts. Hoare was instrumental in proposing the Verified Software Initiative, a cooperative international project directed at the scientific challenges of large-scale software verification, encompassing theories, tools and experiments. Tony Hoare's contributions to the theory and practice of concurrent software systems are equally impressive. The process algebra called Communicating Sequential Processes (CSP) has been one of the fundamental paradigms, both as a mathematical theory to reason about concurrent computation as well as the basis for the programming language occam. CSP served as a framework for exploring several ideas in denotational semantics such as powerdomains, as well as notions of abstraction and refinement. It is the basis for a series of industrial-strength tools which have been employed in a wide range of applications. This book also presents Hoare's work in the last few decades. These works include a rigorous approach to specifications in software engineering practice, including procedural and data abstractions, data refinement, and a modular theory of designs. More recently, he has worked with collaborators to develop Unifying Theories of Programming (UTP). Their goal is to identify the common algebraic theories that lie at the core of sequential, concurrent, reactive and cyber-physical computations.
This book provides a comprehensive introduction to applying compressive sensing to improve data quality in the context of mobile crowdsensing. It addresses the following main topics: recovering missing data, efficiently collecting data, preserving user privacy, and detecting false data. Mobile crowdsensing, as an emerging sensing paradigm, enables the masses to take part in data collection tasks with the aid of powerful mobile devices. However, mobile crowdsensing platforms have yet to be widely adopted in practice, the major concern being the quality of the data collected. There are numerous causes: some locations may generate redundant data, while others may not be covered at all, since the participants are rarely systematically coordinated; privacy is a concern for some people, who don't wish to share their real-time locations, and therefore some key information may be missing; further, some participants may upload fake data in order to fraudulently gain rewards. To address these problematic aspects, compressive sensing, which works by accurately recovering a sparse signal using very few samples, has proven to offer an effective solution.
Algorithms are now widely employed to make decisions that have increasingly far-reaching impacts on individuals and society as a whole ("algorithmic governance"), which could potentially lead to manipulation, biases, censorship, social discrimination, violations of privacy, property rights, and more. This has sparked a global debate on how to regulate AI and robotics ("governance of algorithms"). This book discusses both of these key aspects: the impact of algorithms, and the possibilities for future regulation.
This book highlights practical solutions for flight safety improvement techniques, which are currently the focus of the International Civil Aviation Organization (ICAO). It has become clear that, in order to rapidly and significantly improve flight safety, the integrated use of new aeronautical technologies is called for. Considering the size of the aviation fleet, its constant growth and the long service lives of aircraft, new technologies should be adapted both to cutting-edge air navigation systems and to those that have been used for over a decade. Concretely, the book discusses methodological approaches to the construction of ground and on-board avionics that make it possible to achieve improved flight safety using innovative new methods. The proposed approaches are illustrated with real-world examples of e.g. satellite-based navigation systems and enhanced ground proximity warning systems. The book is written for professionals involved in the development of avionics systems, as well as students, researchers and experts in the field of radiolocation, radio navigation and air traffic control, the book will support the development and modeling of radio technical complexes, as well as the analysis of complex radio technical systems.
This book presents fundamental new techniques for understanding and processing geospatial data. These "spatial gems" articulate and highlight insightful ideas that often remain unstated in graduate textbooks, and which are not the focus of research papers. They teach us how to do something useful with spatial data, in the form of algorithms, code, or equations. Unlike a research paper, Spatial Gems, Volume 1 does not focus on "Look what we have done!" but rather shows "Look what YOU can do!" With contributions from researchers at the forefront of the field, this volume occupies a unique position in the literature by serving graduate students, professional researchers, professors, and computer developers in the field alike.
This book provides a broad overview of the many card systems and solutions that are in practical use today. This new edition adds content on RFIDs, embedded security, attacks and countermeasures, security evaluation, javacards, banking or payment cards, identity cards and passports, mobile systems security, and security management. A step-by-step approach educates the reader in card types, production, operating systems, commercial applications, new technologies, security design, attacks, application development, deployment and lifecycle management. By the end of the book the reader should be able to play an educated role in a smart card related project, even to programming a card application. This book is designed as a textbook for graduate level students in computer science. It is also as an invaluable post-graduate level reference for professionals and researchers. This volume offers insight into benefits and pitfalls of diverse industry, government, financial and logistics aspects while providing a sufficient level of technical detail to support technologists, information security specialists, engineers and researchers.
Reference MWAPI shows readers how to develop robust Windows
applications using the innovative M Windowing Applications
Interface (MWAPI). This book uses numerous tables, illustrations,
sample programs, images and discussions to demonstrate how high
quality graphical user interface applications are created using a
technology that insulates the user from the intricacies and
complexities of any particular Windows environment. It shows how
applications created through the host-independent development
environment can be ported to any Windows platform with no change in
source code while maintaining the look and feel of event-processing
methodology. It examines portability and compact code, some of the
traits the MWAPI shares with the Java programming language. |
![]() ![]() You may like...
Fundamentals of Algebraic Specification…
Hartmut Ehrig, Bernd Mahr
Hardcover
R1,612
Discovery Miles 16 120
A Survey on Coordinated Power Management…
Thant Zin Oo, Nguyen H. Tran, …
Hardcover
R3,485
Discovery Miles 34 850
Applications of Blockchain in Healthcare
Suyel Namasudra, Ganesh Chandra Deka
Hardcover
R5,112
Discovery Miles 51 120
Boolean Functions and Their Applications…
Chuankun Wu, Dengguo Feng
Hardcover
R4,268
Discovery Miles 42 680
Grids, P2P and Services Computing
Frederic Desprez, Vladimir Getov, …
Hardcover
R4,467
Discovery Miles 44 670
Compiler Technology - Tools, Translators…
Derek Beng Kee Kiong
Hardcover
R4,477
Discovery Miles 44 770
The Verilog (R) Hardware Description…
Donald E. Thomas, Philip R. Moorby
Hardcover
R3,600
Discovery Miles 36 000
Algorithms as a Basis of Modern Applied…
Sarka Hoskova-Mayerova, Cristina Flaut, …
Hardcover
R5,643
Discovery Miles 56 430
|