|
|
Books > Computing & IT
Robotics for Cell Manipulation and Characterization provides
fundamental principles underpinning robotic cell manipulation and
characterization, state-of-the-art technical advances in micro/nano
robotics, new discoveries of cell biology enabled by robotic
systems, and their applications in clinical diagnosis and
treatment. This book covers several areas, including robotics,
control, computer vision, biomedical engineering and life sciences
using understandable figures and tables to enhance readers'
comprehension and pinpoint challenges and opportunities for
biological and biomedical research.
Advances in Imaging and Electron Physics, Volume 226 merges two
long-running serials, Advances in Electronics and Electron Physics
and Advances in Optical and Electron Microscopy. Chapters in this
release cover Characterization of nanomaterials properties using
FE-TEM, Cold field-emission electron sources: From higher
brightness to ultrafast beams, Every electron counts: Towards the
development of aberration optimized and aberration corrected
electron sources, and more. The series features articles on the
physics of electron devices (especially semiconductor devices),
particle optics at high and low energies, microlithography, image
science, digital image processing, electromagnetic wave
propagation, electron microscopy and the computing methods used in
all these domains.
State Space Systems with Time-Delays Analysis, Identification and
Applications covers the modeling, identification and control of
industrial applications, including system identification, parameter
estimation, dynamic simulation, nonlinear control, and other
emerging techniques. The book introduces basic time-delay systems,
architectures and control methods. Emphasis is placed on the
mathematical analysis of these systems, identifying them, and
applying them to practical engineering problems such as three
independent water tank systems and distillation systems. This book
contains a wide range of time-delay system identification methods
that can help readers master the system controllers' design
methods.
Reachable Sets of Dynamic Systems: Uncertainty, Sensitivity, and
Complex Dynamics introduces differential inclusions, providing an
overview as well as multiple examples of its interdisciplinary
applications. The design of dynamic systems of any type is an
important issue as is the influence of uncertainty in model
parameters and model sensitivity. The possibility of calculating
the reachable sets may be a powerful additional tool in such tasks.
This book can help graduate students, researchers, and engineers
working in the field of computer simulation and model building, in
the calculation of reachable sets of dynamic models.
The promises and realities of digital innovation have come to
suffuse everything from city regions to astronomy, government to
finance, art to medicine, politics to warfare, and from genetics to
reality itself. Digital systems augmenting physical space,
buildings, and communities occupy a special place in the
evolutionary discourse about advanced technology. The two
Intelligent Environments books edited by Peter Droege span a
quarter of a century across this genre. The second volume,
Intelligent Environments: Advanced Systems for a Healthy Planet,
asks: how does civilization approach thinking systems, intelligent
spatial models, design methods, and support structures designed for
sustainability, in ways that could counteract challenges to
terrestrial habitability? This book examines a range of baseline
and benchmark practices but also unusual and even sublime endeavors
across regions, currencies, infrastructure, architecture,
transactive electricity, geodesign, net-positive planning, remote
work, integrated transport, and artificial intelligence in
understanding the most immediate spatial setting: the human body.
The result of this quest is both highly informative and useful, but
also critical. It opens windows on what must fast become a central
and overarching existential focus in the face of anthropogenic
planetary heating and other threats-and raises concomitant
questions about direction, scope, and speed of that change.
Studies on integer optimization in emergency management have
attracted engineers and scientists from various disciplines such as
management, mathematics, computer science, and other fields.
Although there are a large number of literature reports on integer
planning and emergency events, few books systematically explain the
combination of the two. Researchers need a clear and thorough
presentation of the theory and application of integer programming
methods for emergency management. Integer Optimization and its
Computation in Emergency Management investigates the computation
theory of integer optimization, developing integer programming
methods for emergency management and explores related practical
applications. Pursuing a holistic approach, this book establishes a
fundamental framework for this topic, intended for graduate
students who are interested in operations research and
optimization, researchers investigating emergency management, and
algorithm design engineers working on integer programming or other
optimization applications.
Cardiovascular and Coronary Artery Imaging, Volume Two presents the
basics of echocardiography, nuclear imaging and magnetic resonance
imaging (MRI) and provides insights into their appropriate use. The
book covers state-of-the-art approaches for automated non-invasive
systems for early cardiovascular and coronary artery disease
diagnosis. It includes several prominent imaging modalities such as
MRI, CT and PET technologies. Other sections focus on major trends
and challenges in this area and present the latest techniques for
cardiovascular and coronary image analysis.
Customized Production Through 3D Printing in Cloud Manufacturing
explains how to combine the latest cloud manufacturing and additive
manufacturing technology to find innovative solutions to important
problems in research and industry. The manufacturing industry
strives constantly to improve levels of product personalization for
its customers, who have become increasingly demanding in this
respect in recent decades. Among the tools currently growing in use
in the industry, there is great potential to address this demand.
Cloud manufacturing maps manufacturing resources and capabilities
to the cloud, adding the capacity to gather decentralized
manufacturing resources and use manufacturing services on-demand,
and 3D printing provides strong support for truly individualized
manufactured components. This is the first book to cover the whole
lifecycle of 3D printing services in a cloud environment, including
topics like: cloud servitization of 3D printers, 3D printing model
design, supply-demand matching and scheduling, on-demand using and
pricing, printing monitoring in cloud, and printing service
evaluation. With a systematic introduction to this promising
manufacturing paradigm, as well as coverage of models and service
management to practical applications, this book will meet the needs
of a broad range of researchers as well as practitioners.
The 130th volume is an eclectic volume inspired by recent issues of
interest in research and development in computer science and
computer engineering. The volume is a collection of five chapters.
A complete and authoritative discussion of systems engineering and
neural networks In Systems Engineering Neural Networks, a team of
distinguished researchers deliver a thorough exploration of the
fundamental concepts underpinning the creation and improvement of
neural networks with a systems engineering mindset. In the book,
you'll find a general theoretical discussion of both systems
engineering and neural networks accompanied by coverage of relevant
and specific topics, from deep learning fundamentals to sport
business applications. Readers will discover in-depth examples
derived from many years of engineering experience, a comprehensive
glossary with links to further reading, and supplementary online
content. The authors have also included a variety of applications
programmed in both Python 3 and Microsoft Excel. The book provides:
A thorough introduction to neural networks, introduced as key
element of complex systems Practical discussions of systems
engineering and forecasting, complexity theory and optimization and
how these techniques can be used to support applications outside of
the traditional AI domains Comprehensive explorations of input and
output, hidden layers, and bias in neural networks, as well as
activation functions, cost functions, and back-propagation
Guidelines for software development incorporating neural networks
with a systems engineering methodology Perfect for students and
professionals eager to incorporate machine learning techniques into
their products and processes, Systems Engineering Neural Networks
will also earn a place in the libraries of managers and researchers
working in areas involving neural networks.
Mathematical Methods in Data Science introduces a new approach
based on network analysis to integrate big data into the framework
of ordinary and partial differential equations for data analysis
and prediction. The mathematics is accompanied with examples and
problems arising in data science to demonstrate advanced
mathematics, in particular, data-driven differential equations
used. Chapters also cover network analysis, ordinary and partial
differential equations based on recent published and unpublished
results. Finally, the book introduces a new approach based on
network analysis to integrate big data into the framework of
ordinary and partial differential equations for data analysis and
prediction. There are a number of books on mathematical methods in
data science. Currently, all these related books primarily focus on
linear algebra, optimization and statistical methods. However,
network analysis, ordinary and partial differential equation models
play an increasingly important role in data science. With the
availability of unprecedented amount of clinical, epidemiological
and social COVID-19 data, data-driven differential equation models
have become more useful for infection prediction and analysis.
Data Analysis for Social Microblogging Platforms explores the
nature of microblog datasets, also covering the larger field which
focuses on information, data and knowledge in the context of
natural language processing. The book investigates a range of
significant computational techniques which enable data and computer
scientists to recognize patterns in these vast datasets, including
machine learning, data mining algorithms, rough set and fuzzy set
theory, evolutionary computations, combinatorial pattern matching,
clustering, summarization and classification. Chapters focus on
basic online micro blogging data analysis research methodologies,
community detection, summarization application development,
performance evaluation and their applications in big data.
Principles of Big Graph: In-depth Insight, Volume 128 in the
Advances in Computer series, highlights new advances in the field
with this new volume presenting interesting chapters on a variety
of topics, including CESDAM: Centered subgraph data matrix for
large graph representation, Bivariate, cluster and suitability
analysis of NoSQL Solutions for big graph applications, An
empirical investigation on Big Graph using deep learning, Analyzing
correlation between quality and accuracy of graph clustering,
geneBF: Filtering protein-coded gene graph data using bloom filter,
Processing large graphs with an alternative representation,
MapReduce based convolutional graph neural networks: A
comprehensive review. Fast exact triangle counting in large graphs
using SIMD acceleration, A comprehensive investigation on attack
graphs, Qubit representation of a binary tree and its operations in
quantum computation, Modified ML-KNN: Role of similarity measures
and nearest neighbor configuration in multi label text
classification on big social network graph data, Big graph based
online learning through social networks, Community detection in
large-scale real-world networks, Power rank: An interactive web
page ranking algorithm, GA based energy efficient modelling of a
wireless sensor network, The major challenges of big graph and
their solutions: A review, and An investigation on socio-cyber
crime graph.
Handbook of Mobility Data Mining: Volume Three: Mobility
Data-Driven Applications introduces the fundamental technologies of
mobile big data mining (MDM), advanced AI methods, and upper-level
applications, helping readers comprehensively understand MDM with a
bottom-up approach. The book explains how to preprocess mobile big
data, visualize urban mobility, simulate and predict human travel
behavior, and assess urban mobility characteristics and their
matching performance as conditions and constraints in transport,
emergency management, and sustainability development systems. The
book contains crucial information for researchers, engineers,
operators, administrators, and policymakers seeking greater
understanding of current technologies' infra-knowledge structure
and limitations. The book introduces how to design MDM platforms
that adapt to the evolving mobility environment-and new types of
transportation and users-based on an integrated solution that
utilizes sensing and communication capabilities to tackle
significant challenges faced by the MDM field. This third volume
looks at various cases studies to illustrate and explore the
methods introduced in the first two volumes, covering topics such
as Intelligent Transportation Management, Smart Emergency
Management-detailing cases such as the Fukushima earthquake,
Hurricane Katrina, and COVID-19-and Urban Sustainability
Development, covering bicycle and railway travel behavior, mobility
inequality, and road and light pollution inequality.
Zeroing Neural Networks Describes the theoretical and practical
aspects of finite-time ZNN methods for solving an array of
computational problems Zeroing Neural Networks (ZNN) have become
essential tools for solving discretized sensor-driven time-varying
matrix problems in engineering, control theory, and on-chip
applications for robots. Building on the original ZNN model,
finite-time zeroing neural networks (FTZNN) enable efficient,
accurate, and predictive real-time computations. Setting up
discretized FTZNN algorithms for different time-varying matrix
problems requires distinct steps. Zeroing Neural Networks provides
in-depth information on the finite-time convergence of ZNN models
in solving computational problems. Divided into eight parts, this
comprehensive resource covers modeling methods, theoretical
analysis, computer simulations, nonlinear activation functions, and
more. Each part focuses on a specific type of time-varying
computational problem, such as the application of FTZNN to the
Lyapunov equation, linear matrix equation, and matrix inversion.
Throughout the book, tables explain the performance of different
models, while numerous illustrative examples clarify the advantages
of each FTZNN method. In addition, the book: Describes how to
design, analyze, and apply FTZNN models for solving computational
problems Presents multiple FTZNN models for solving time-varying
computational problems Details the noise-tolerance of FTZNN models
to maximize the adaptability of FTZNN models to complex
environments Includes an introduction, problem description, design
scheme, theoretical analysis, illustrative verification,
application, and summary in every chapter Zeroing Neural Networks:
Finite-time Convergence Design, Analysis and Applications is an
essential resource for scientists, researchers, academic lecturers,
and postgraduates in the field, as well as a valuable reference for
engineers and other practitioners working in neurocomputing and
intelligent control.
Modeling and Nonlinear Robust Control of Delta-Like Parallel
Kinematic Manipulators deals with the modeling and control of
parallel robots. The book's content will benefit students,
researchers and engineers in robotics by providing a simplified
methodology to obtain the dynamic model of parallel robots with a
delta-type architecture. Moreover, this methodology is compatible
with the real-time implementation of model-based and robust control
schemes. And, it can easily extend the proposed robust control
solutions to other robotic architectures.
DNA or Deoxyribonucleic Acid computing is an emerging branch of
computing that uses DNA sequence, biochemistry, and hardware for
encoding genetic information in computers. Here, information is
represented by using the four genetic alphabets or DNA bases,
namely A (Adenine), G (Guanine), C (Cytosine), and T (Thymine),
instead of the binary representation (1 and 0) used by traditional
computers. This is achieved because short DNA molecules of any
arbitrary sequence of A, G, C, and T can be synthesized to order.
DNA computing is mainly popular for three reasons: (i) speed (ii)
minimal storage requirements, and (iii) minimal power requirements.
There are many applications of DNA computing in the field of
computer science. Nowadays, DNA computing is widely used in
cryptography for achieving a strong security technique, so that
unauthorized users are unable to retrieve the original data
content. In DNA-based encryption, data are encrypted by using DNA
bases (A, T, G, and C) instead of 0 and 1. As four DNA bases are
used in the encryption process, DNA computing supports more
randomness and makes it more complex for attackers or malicious
users to hack the data. DNA computing is also used for data storage
because a large number of data items can be stored inside the
condensed volume. One gram of DNA holds approx DNA bases or approx
700 TB. However, it takes approx 233 hard disks to store the same
data on 3 TB hard disks, and the weight of all these hard disks can
be approx 151 kilos. In a cloud environment, the Data Owner (DO)
stores their confidential encrypted data outside of their own
domain, which attracts many attackers and hackers. DNA computing
can be one of the best solutions to protect the data of a cloud
server. Here, the DO can use DNA bases to encrypt the data by
generating a long DNA sequence. Another application of DNA
computing is in Wireless Sensor Network (WSN). Many researchers are
trying to improve the security of WSN by using DNA computing. Here,
DNA cryptography is used along with Secure Socket Layer (SSL) that
supports a secure medium to exchange information. However, recent
research shows some limitations of DNA computing. One of the
critical issues is that DNA cryptography does not have a strong
mathematical background like other cryptographic systems. This
edited book is being planned to bring forth all the information of
DNA computing. Along with the research gaps in the currently
available books/literature, this edited book presents many
applications of DNA computing in the fields of computer science.
Moreover, research challenges and future work directions in DNA
computing are also provided in this edited book.
Management and Engineering of Critical Infrastructures focuses on
two important aspects of CIS, management and engineering. The book
provides an ontological foundation for the models and methods
needed to design a set of systems, networks and assets that are
essential for a society's functioning, and for ensuring the
security, safety and economy of a nation. Various examples in
agriculture, the water supply, public health, transportation,
security services, electricity generation, telecommunication, and
financial services can be used to substantiate dangers. Disruptions
of CIS can have serious cascading consequences that would stop
society from functioning properly and result in loss of life.
Malicious software (a.k.a., malware), for example, can disrupt the
distribution of electricity across a region, which in turn can lead
to the forced shutdown of communication, health and financial
sectors. Subsequently, proper engineering and management are
important to anticipate possible risks and threats and provide
resilient CIS. Although the problem of CIS has been broadly
acknowledged and discussed, to date, no unifying theory nor
systematic design methods, techniques and tools exist for such CIS.
There is now a plethora of internet of things (IoT) devices on the
market that can connect to the internet and the desired environment
to produce sufficient and reliable data that is required by the
government administration for a variety of purposes. Additionally,
the potential benefits of incorporating artificial intelligence
(AI) and machine learning into governance are numerous. Governments
can use AI and machine learning to enforce the law, detect fraud,
and monitor urban areas by identifying problems before they occur.
The government can also use AI to easily automate processes and
replace mundane and repetitive tasks. AI, IoT, and Blockchain
Breakthroughs in E-Governance defines and emphasizes various AI
algorithms as well as new internet of things and blockchain
breakthroughs in the field of e-governance. Covering key topics
such as machine learning, government, and artificial intelligence,
this premier reference source is ideal for government officials,
policymakers, researchers, academicians, practitioners, scholars,
instructors, and students.
Deep neural networks (DNNs) with their dense and complex algorithms
provide real possibilities for Artificial General Intelligence
(AGI). Meta-learning with DNNs brings AGI much closer: artificial
agents solving intelligent tasks that human beings can achieve,
even transcending what they can achieve. Meta-Learning: Theory,
Algorithms and Applications shows how meta-learning in combination
with DNNs advances towards AGI. Meta-Learning: Theory, Algorithms
and Applications explains the fundamentals of meta-learning by
providing answers to these questions: What is meta-learning?; why
do we need meta-learning?; how are self-improved meta-learning
mechanisms heading for AGI ?; how can we use meta-learning in our
approach to specific scenarios? The book presents the background of
seven mainstream paradigms: meta-learning, few-shot learning, deep
learning, transfer learning, machine learning, probabilistic
modeling, and Bayesian inference. It then explains important
state-of-the-art mechanisms and their variants for meta-learning,
including memory-augmented neural networks, meta-networks,
convolutional Siamese neural networks, matching networks,
prototypical networks, relation networks, LSTM meta-learning,
model-agnostic meta-learning, and the Reptile algorithm. The book
takes a deep dive into nearly 200 state-of-the-art meta-learning
algorithms from top tier conferences (e.g. NeurIPS, ICML, CVPR,
ACL, ICLR, KDD). It systematically investigates 39 categories of
tasks from 11 real-world application fields: Computer Vision,
Natural Language Processing, Meta-Reinforcement Learning,
Healthcare, Finance and Economy, Construction Materials, Graphic
Neural Networks, Program Synthesis, Smart City, Recommended
Systems, and Climate Science. Each application field concludes by
looking at future trends or by giving a summary of available
resources. Meta-Learning: Theory, Algorithms and Applications is a
great resource to understand the principles of meta-learning and to
learn state-of-the-art meta-learning algorithms, giving the
student, researcher and industry professional the ability to apply
meta-learning for various novel applications.
Coulomb Interactions in Particle Beams, Volume 223 in the Advances
in Imaging and Electron Physics series, merges two long-running
serials, Advances in Electronics and Electron Physics and Advances
in Optical and Electron Microscopy. The series features articles on
the physics of electron devices (especially semiconductor devices),
particle optics at high and low energies, microlithography, image
science, digital image processing, electromagnetic wave
propagation, electron microscopy, and computing methods used in all
these domains, with this release exploring Coulomb Interactions in
Particle Beams.
|
|