|
Books > Computing & IT
Chatbots offer exceptional services to end-users due to various
factors including the ability to respond to customers' requests
quickly according to their convenience. Given the magnitude of
research and interest in chatbots, further study on several vital
and evolving concerns including human-bot interaction, chatbot
adoption, chatbot architecture and design considerations, and
chatbot evaluation is required to ensure the technology is utilized
appropriately. Trends, Applications, and Challenges of Chatbot
Technology provides novel research content and reviews of current
chatbot technology and sheds light on challenges and open questions
as well as possible research directions. Covering key topics such
as human-computer interaction, customer support, and algorithms,
this reference work is ideal for computer scientists, industry
professionals, policymakers, researchers, academicians,
practitioners, scholars, instructors, and students.
This book explains the concepts, history, and implementation of IT
infrastructures. Although many of books can be found on each
individual infrastructure building block, this is the first book to
describe all of them: datacenters, servers, networks, storage,
operating systems, and end user devices. The building blocks
described in this book provide functionality, but they also provide
the non-functional attributes performance, availability, and
security. These attributes are explained on a conceptual level in
separate chapters, and specific in the chapters about each
individual building block. Whether you need an introduction to
infrastructure technologies, a refresher course, or a study guide
for a computer science class, you will find that the presented
building blocks and concepts provide a solid foundation for
understanding the complexity of today's IT infrastructures. This
book can be used as part of IT architecture courses based on the IS
2010.4 curriculum.
User opinions about service experiences have been extensively
acknowledged to play a key role in influencing the consumption
decisions of other customers. The widespread adoption of internet
technologies has amplified enormously the volume and the potential
impact of such customer-generated content in the form of electronic
word-of-mouth (eWOM). Exploring the Power of Electronic
Word-of-Mouth in the Services Industry is an essential research
book that explores the importance of consumer perception and the
influence of word-of-mouth in the digital world. Featuring a range
of topics such as data mining, online engagement, and social media,
this book is ideal for academicians, researchers, IT developers,
marketers, managers, media specialists, and professionals.
Uses the two programming languages officially supported in ROS2
(C++, mainly, and Python). Approaches ROS2 from three different but
complementary dimensions; the Community, Computation Graph, and the
Workspace. Includes a complete simulated robot, development and
testing strategies, Behavior Trees, and Nav2 description, setup and
use. A GitHub repository with code to assist readers.
Java Card is one of the latest developments in the area of
multi-application and platform-independent smart cards. As a
working tool for professionals, this easy-to-understand resource
provides clear, detailed guidance on smart cards, credit and debit
cards, Java Card and Open Card Framework (OCF). It offers in-depth
coverage of important standards, open specifications and critical
security issues, including common threats and security mechanisms
regarding the card and its connection interface. The book explains
how to program a Java Card applet, an OCF card service and a
terminal application. What's more, the book presents an informative
case study on the credit-debit application, offering a detailed
road map of the application development process.
Discover why privacy is a counterproductive, if not obsolete,
concept in this startling new book It's only a matter of time-- the
modern notion of privacy is quickly evaporating because of
technological advancement and social engagement. Whether we like it
or not, all our actions and communications are going to be revealed
for everyone to see. Exposed: How Revealing Your Data and
Eliminating Privacy Increases Trust and Liberates Humanity takes a
controversial and insightful look at the concept of privacy and
persuasively argues that preparing for a post-private future is
better than exacerbating the painful transition by attempting to
delay the inevitable. Security expert and author Ben Malisow
systematically dismantles common notions of privacy and explains
how: Most arguments in favor of increased privacy are wrong Privacy
in our personal lives leaves us more susceptible to being bullied
or blackmailed Governmental and military privacy leads to an
imbalance of power between citizen and state Military supremacy
based on privacy is an obsolete concept Perfect for anyone
interested in the currently raging debates about governmental,
institutional, corporate, and personal privacy, and the proper
balance between the public and the private, Exposed also belongs on
the shelves of security practitioners and policymakers everywhere.
Translation and communication between cultures can sometimes be a
difficult process. Image-based assessments can offer a way for
large populations to be tested on different subjects without having
to create multiple testing programs. Cross-Cultural Analysis of
Image-Based Assessments: Emerging Research and Opportunities is an
innovative resource that offers insight into the application of
visual assessments across a global and intercultural context.
Highlighting applicable topics which include visual literacy,
psychological assessments, assessment development, and equivalency
measurements, this publication is ideal for psychologists,
therapists, and researchers who would like to stay current on the
most efficient way to test multi-cultural populations in various
fields of knowledge.
In today's digital world, the huge amount of data being generated
is unstructured, messy, and chaotic in nature. Dealing with such
data, and attempting to unfold the meaningful information, can be a
challenging task. Feature engineering is a process to transform
such data into a suitable form that better assists with
interpretation and visualization. Through this method, the
transformed data is more transparent to the machine learning
models, which in turn causes better prediction and analysis of
results. Data science is crucial for the data scientist to assess
the trade-offs of their decisions regarding the effectiveness of
the machine learning model implemented. Investigating the demand in
this area today and in the future is a necessity. The Handbook of
Research on Automated Feature Engineering and Advanced Applications
in Data Science provides an in-depth analysis on both the
theoretical and the latest empirical research findings on how
features can be extracted and transformed from raw data. The
chapters will introduce feature engineering and the recent
concepts, methods, and applications with the use of various data
types, as well as examine the latest machine learning applications
on the data. While highlighting topics such as detection, tracking,
selection techniques, and prediction models using data science,
this book is ideally intended for research scholars, big data
scientists, project developers, data analysts, and computer
scientists along with practitioners, researchers, academicians, and
students interested in feature engineering and its impact on data.
The highly dynamic world of information technology service
management stresses the benefits of the quick and correct
implementation of IT services. A disciplined approach relies on a
separate set of assumptions and principles as an agile approach,
both of which have complicated implementation processes as well as
copious benefits. Combining these two approaches to enhance the
effectiveness of each, while difficult, can yield exceptional
dividends. Balancing Agile and Disciplined Engineering and
Management Approaches for IT Services and Software Products is an
essential publication that focuses on clarifying theoretical
foundations of balanced design methods with conceptual frameworks
and empirical cases. Highlighting a broad range of topics including
business trends, IT service, and software development, this book is
ideally designed for software engineers, software developers,
programmers, information technology professionals, researchers,
academicians, and students.
This book explores new methods, architectures, tools, and
algorithms for Artificial Intelligence Hardware Accelerators. The
authors have structured the material to simplify readers’ journey
toward understanding the aspects of designing hardware
accelerators, complex AI algorithms, and their computational
requirements, along with the multifaceted applications. Coverage
focuses broadly on the hardware aspects of training, inference,
mobile devices, and autonomous vehicles (AVs) based AI accelerators
|
|