|
Books > Computing & IT
This book explores new methods, architectures, tools, and
algorithms for Artificial Intelligence Hardware Accelerators. The
authors have structured the material to simplify readers’ journey
toward understanding the aspects of designing hardware
accelerators, complex AI algorithms, and their computational
requirements, along with the multifaceted applications. Coverage
focuses broadly on the hardware aspects of training, inference,
mobile devices, and autonomous vehicles (AVs) based AI accelerators
Research in the domains of learning analytics and educational data
mining has prototyped an approach where methodologies from data
science and machine learning are used to gain insights into the
learning process by using large amounts of data. As many training
and academic institutions are maturing in their data-driven
decision making, useful, scalable, and interesting trends are
emerging. Organizations can benefit from sharing information on
those efforts. Applying Data Science and Learning Analytics
Throughout a Learner's Lifespan examines novel and emerging
applications of data science and sister disciplines for gaining
insights from data to inform interventions into learners' journeys
and interactions with academic institutions. Data is collected at
various times and places throughout a learner's lifecycle, and the
learners and the institution should benefit from the insights and
knowledge gained from this data. Covering topics such as learning
analytics dashboards, text network analysis, and employment
recruitment, this book is an indispensable resource for educators,
computer scientists, faculty of higher education, government
officials, educational administration, students of higher
education, pre-service teachers, business professionals,
researchers, and academicians.
In the very near future, "smart" technologies and "big data" will
allow us to make large-scale and sophisticated interventions in
politics, culture, and everyday life. Technology will allow us to
solve problems in highly original ways and create new incentives to
get more people to do the right thing. But how will such
"solutionism" affect our society, once deeply political, moral, and
irresolvable dilemmas are recast as uncontroversial and easily
manageable matters of technological efficiency? What if some such
problems are simply vices in disguise? What if some friction in
communication is productive and some hypocrisy in politics
necessary? The temptation of the digital age is to fix
everything--from crime to corruption to pollution to obesity--by
digitally quantifying, tracking, or gamifying behavior. But when we
change the motivations for our moral, ethical, and civic behavior
we may also change the very nature of that behavior. Technology,
Evgeny Morozov proposes, can be a force for improvement--but only
if we keep solutionism in check and learn to appreciate the
imperfections of liberal democracy. Some of those imperfections are
not accidental but by design.
Arguing that we badly need a new, post-Internet way to debate the
moral consequences of digital technologies, "To Save Everything,
Click Here" warns against a world of seamless efficiency, where
everyone is forced to wear Silicon Valley's digital
straitjacket.
The Dark Web is a known hub that hosts myriad illegal activities
behind the veil of anonymity for its users. For years now, law
enforcement has been struggling to track these illicit activities
and put them to an end. However, the depth and anonymity of the
Dark Web has made these efforts difficult, and as cyber criminals
have more advanced technologies available to them, the struggle
appears to only have the potential to worsen. Law enforcement and
government organizations also have emerging technologies on their
side, however. It is essential for these organizations to stay up
to date on these emerging technologies, such as computational
intelligence, in order to put a stop to the illicit activities and
behaviors presented in the Dark Web. Using Computational
Intelligence for the Dark Web and Illicit Behavior Detection
presents the emerging technologies and applications of
computational intelligence for the law enforcement of the Dark Web.
It features analysis into cybercrime data, examples of the
application of computational intelligence in the Dark Web, and
provides future opportunities for growth in this field. Covering
topics such as cyber threat detection, crime prediction, and
keyword extraction, this premier reference source is an essential
resource for government organizations, law enforcement agencies,
non-profit organizations, politicians, computer scientists,
researchers, students, and academicians.
Information systems development underwent many changes as systems
transitioned onto web-based forums. Complemented by advancements in
security and technology, internet-based systems have become an
information mainstay. The Handbook of Research on Contemporary
Perspectives on Web-Based Systems is a critical scholarly resource
that examines relevant theoretical frameworks, current practice
guidelines, industry standards, and the latest empirical research
findings in web-based systems. Featuring coverage on a wide range
of topics such as data integration, mobile applications, and
semantic web, this publication is geared toward computer engineers,
IT specialists, software designers, professionals, researchers, and
upper-level students seeking current and relevant research on the
prevalence of these systems and advancements made to them.
Parallelism is the key to achieving high performance in computing.
However, writing efficient and scalable parallel programs is
notoriously difficult, and often requires significant expertise. To
address this challenge, it is crucial to provide programmers with
high-level tools to enable them to develop solutions easily, and at
the same time emphasize the theoretical and practical aspects of
algorithm design to allow the solutions developed to run
efficiently under many different settings. This thesis addresses
this challenge using a three-pronged approach consisting of the
design of shared-memory programming techniques, frameworks, and
algorithms for important problems in computing. The thesis provides
evidence that with appropriate programming techniques, frameworks,
and algorithms, shared-memory programs can be simple, fast, and
scalable, both in theory and in practice. The results developed in
this thesis serve to ease the transition into the multicore era.
The first part of this thesis introduces tools and techniques for
deterministic parallel programming, including means for
encapsulating nondeterminism via powerful commutative building
blocks, as well as a novel framework for executing sequential
iterative loops in parallel, which lead to deterministic parallel
algorithms that are efficient both in theory and in practice. The
second part of this thesis introduces Ligra, the first high-level
shared memory framework for parallel graph traversal algorithms.
The framework allows programmers to express graph traversal
algorithms using very short and concise code, delivers performance
competitive with that of highly-optimized code, and is up to orders
of magnitude faster than existing systems designed for distributed
memory. This part of the thesis also introduces Ligra , which
extends Ligra with graph compression techniques to reduce space
usage and improve parallel performance at the same time, and is
also the first graph processing system to support in-memory graph
compression. The third and fourth parts of this thesis bridge the
gap between theory and practice in parallel algorithm design by
introducing the first algorithms for a variety of important
problems on graphs and strings that are efficient both in theory
and in practice. For example, the thesis develops the first
linear-work and polylogarithmic-depth algorithms for suffix tree
construction and graph connectivity that are also practical, as
well as a work-efficient, polylogarithmic-depth, and
cache-efficient shared-memory algorithm for triangle computations
that achieves a 2-5x speedup over the best existing algorithms on
40 cores. This is a revised version of the thesis that won the 2015
ACM Doctoral Dissertation Award.
Wearable technology can range anywhere between activity trackers to
prosthetics. These new advancements are continuously progressing
and becoming a part of daily life. Examining Developments and
Applications of Wearable Devices in Modern Society is a pivotal
reference source for the most innovative research on the expansion
of wearable computing and technology. Featuring coverage on a broad
range of topics such as stroke monitoring, augmented reality, and
cancer detection, this publication is ideally designed for
academicians, researchers, and students seeking current research on
the challenges and benefits of the latest wearable devices.
|
|