|
|
Books > Computing & IT
The Handbook on Socially Interactive Agents provides a
comprehensive overview of the research fields of Embodied
Conversational Agents Intelligent Virtual Agents and Social
Robotics. Socially Interactive Agents (SIAs) whether virtually or
physically embodied are autonomous agents that are able to perceive
an environment including people or other agents reason decide how
to interact and express attitudes such as emotions engagement or
empathy. They are capable of interacting with people and one
another in a socially intelligent manner using multimodal
communicative behaviors with the goal to support humans in various
domains.Written by international experts in their respective fields
the book summarizes research in the many important research
communities pertinent for SIAs while discussing current challenges
and future directions. The handbook provides easy access to
modeling and studying SIAs for researchers and students and aims at
further bridging the gap between the research communities involved.
In two volumes the book clearly structures the vast body of
research. The first volume starts by introducing what is involved
in SIAs research in particular research methodologies and ethical
implications of developing SIAs. It further examines research on
appearance and behavior focusing on multimodality. Finally social
cognition for SIAs is investigated using different theoretical
models and phenomena such as theory of mind or pro-sociality. The
second volume starts with perspectives on interaction examined from
different angles such as interaction in social space group
interaction or long-term interaction. It also includes an extensive
overview summarizing research and systems of human-agent platforms
and of some of the major application areas of SIAs such as
education aging support autism and games.
The concept of autonomic computing seeks to reduce the complexity
of pervasively ubiquitous system management and maintenance by
shifting the responsibility for low-level tasks from humans to the
system while allowing humans to concentrate on high-level tasks.
This is achieved by building self-managing systems that are
generally capable of self-configuring, self-healing,
self-optimising, and self-protecting. Trustworthy autonomic
computing technologies are being applied in datacentre and cloud
management, smart cities and autonomous systems including
driverless cars. However, there are still significant challenges to
achieving trustworthiness. This book covers challenges and
solutions in autonomic computing trustworthiness from methods and
techniques to achieve consistent and reliable system
self-management. Researchers, developers and users need to be
confident that an autonomic self-managing system will remain
correct in the face of any possible contexts and environmental
inputs. The book is aimed at researchers in autonomic computing,
autonomics and trustworthy autonomics. This will be a go-to book
for foundational knowledge, proof of concepts and novel trustworthy
autonomic techniques and approaches. It will be useful to lecturers
and students of autonomic computing, autonomics and multi-agent
systems who need an easy-to-use text with sample codes, exercises,
use-case demonstrations. This is also an ideal tutorial guide for
independent study with simple and well documented diagrams to
explain techniques and processes.
Adversarial Robustness for Machine Learning summarizes the recent
progress on this topic and introduces popular algorithms on
adversarial attack, defense and veri?cation. Sections cover
adversarial attack, veri?cation and defense, mainly focusing on
image classi?cation applications which are the standard benchmark
considered in the adversarial robustness community. Other sections
discuss adversarial examples beyond image classification, other
threat models beyond testing time attack, and applications on
adversarial robustness. For researchers, this book provides a
thorough literature review that summarizes latest progress in the
area, which can be a good reference for conducting future research.
In addition, the book can also be used as a textbook for graduate
courses on adversarial robustness or trustworthy machine learning.
While machine learning (ML) algorithms have achieved remarkable
performance in many applications, recent studies have demonstrated
their lack of robustness against adversarial disturbance. The lack
of robustness brings security concerns in ML models for real
applications such as self-driving cars, robotics controls and
healthcare systems.
Recent years have seen a proliferation of cybersecurity guidance in
the form of government regulations and standards with which
organizations must comply. As society becomes more heavily
dependent on cyberspace, increasing levels of security measures
will need to be established and maintained to protect the
confidentiality, integrity, and availability of information; the
privacy of consumers; and the continuity of economic activity.
Compliance is a measure of the extent to which a current state is
in conformance with a desired state. The desired state is commonly
operationalized through specific business objectives, professional
standards, and regulations. Assurance services provide a means of
evaluating the level of compliance with various cybersecurity
requirements. The proposed book will summarize current
cybersecurity guidance and provide a compendium of innovative and
state-of-the-art compliance and assurance practices and tools that
can function both as a reference and pedagogical source for
practitioners and educators. This publication will provide a
synopsis of current cybersecurity guidance that organizations
should consider in establishing and updating their cybersecurity
systems. Assurance services will also be addressed so that
management and their auditors can regularly evaluate their extent
of compliance. This book should be published because its theme will
provide company management, practitioners, and academics with a
good summary of current guidance and how to conduct assurance of
appropriate compliance.
IoT-enabled Unobtrusive Surveillance Systems for Smart Campus
Safety Enables readers to understand a broad area of
state-of-the-art research in physical IoT-enabled security
IoT-enabled Unobtrusive Surveillance Systems for Smart Campus
Safety describes new techniques in unobtrusive surveillance that
enable people to act and communicate freely, while at the same time
protecting them from malevolent behavior. It begins by
characterizing the latest on surveillance systems deployed at smart
campuses, miniatures of smart cities with more demanding frameworks
that enable learning, social interaction, and creativity, and by
performing a comparative assessment in the area of unobtrusive
surveillance systems for smart campuses. A proposed taxonomy for
IoT-enabled smart campus unfolds in five research dimensions: (1)
physical infrastructure; (2) enabling technologies; (3) software
analytics; (4) system security; and (5) research methodology. By
applying this taxonomy and by adopting a weighted scoring model on
the surveyed systems, the book presents the state of the art and
then makes a comparative assessment to classify the systems.
Finally, the book extracts valuable conclusions and inferences from
this classification, providing insights and directions towards
required services offered by unobtrusive surveillance systems for
smart campuses. IoT-enabled Unobtrusive Surveillance Systems for
Smart Campus Safety includes specific discussion of: Smart campus's
prior work taxonomies and classifications, a proposed taxonomy, and
an adopted weight scoring model Personal consumer benefits and
potential social dilemmas encountered when adopting an unobtrusive
surveillance system Systems that focus on smart buildings, public
spaces, smart lighting and smart traffic lights, smart labs, and
smart campus ambient intelligence A case study of a spatiotemporal
authentication unobtrusive surveillance system for smart campus
safety and emerging issues for further research directions
IoT-enabled Unobtrusive Surveillance Systems for Smart Campus
Safety is an essential resource for computer science and
engineering academics, professionals, and every individual who is
working and doing research in the area of unobtrusive surveillance
systems and physical security to face malevolent behavior in smart
campuses.
Industrial Tomography: Systems and Applications, Second Edition
thoroughly explores the important techniques of industrial
tomography, also discusses image reconstruction, systems, and
applications. This book presents complex processes, including the
way three-dimensional imaging is used to create multiple
cross-sections, and how computer software helps monitor flows,
filtering, mixing, drying processes, and chemical reactions inside
vessels and pipelines. This book is suitable for materials
scientists and engineers and applied physicists working in the
photonics and optoelectronics industry or in the applications
industries.
* This Revision Workbook delivers hassle-free question practice,
covering one topic per page and avoiding lengthy set up time. *
Build your confidence with guided practice questions, before moving
onto unguided questions and practice tests. * With one-to-one page
correspondence between the Workbook and the Revision Guide, this
hugely popular Revision series offers the best value available for
BTEC learners. * Covers both externally assessed Units for 2012
BTEC First in Information and Creative Technology (Units 1 and 2).
Advances in Computers, Volume 124 presents updates on innovations
in computer hardware, software, theory, design and applications,
with this updated volume including new chapters on
Traffic-Load-Aware Virtual Channel Power-gating in
Network-on-Chips, An Efficient DVS Scheme for On-chip Networks, A
Power-Performance Balanced Network-on-Chip for Mixed CPU-GPU
Systems, Routerless Networks-on-Chip, Routing Algorithm Design for
Power- and Temperature-Aware NoCs, Approximate Communication for
Energy-Efficient Network-on-Chip, Power-Efficient NoC Design by
Partial Topology Reconfiguration, The Design of a Deflection-based
Energy-efficient On-chip Network, and Power-Gating in
Networks-on-Chip.
In recent decades, there has been an increasing interest in using
machine learning and, in the last few years, deep learning methods
combined with other vision and image processing techniques to
create systems that solve vision problems in different fields.
There is a need for academicians, developers, and industry-related
researchers to present, share, and explore traditional and new
areas of computer vision, machine learning, deep learning, and
their combinations to solve problems. Computer Vision and Image
Processing in the Deep Learning Era is designed to serve
researchers and developers by sharing original, innovative, and
state-of-the-art algorithms and architectures for applications in
the areas of computer vision, image processing, biometrics, virtual
and augmented reality, and more. It integrates the knowledge of the
growing international community of researchers working on the
application of machine learning and deep learning methods in vision
and robotics. Covering topics such as brain tumor detection, heart
disease prediction, and medical image detection, this premier
reference source is an exceptional resource for medical
professionals, faculty and students of higher education, business
leaders and managers, librarians, government officials,
researchers, and academicians.
Advances in Computers, Volume 127 presents innovations in computer
hardware, software, theory, design and applications, with this
updated volume including new chapters on Edge AI, Edge Computing,
Edge Analytics, Edge Data Analytics, Edge Native Applications, Edge
Platforms, Edge Computing, IoT, Internet of Things, etc.
Stochastic processes have a wide range of applications ranging from
image processing, neuroscience, bioinformatics, financial
management, and statistics. Mathematical, physical, and engineering
systems use stochastic processes for modeling and reasoning
phenomena. While comparing AI-stochastic systems with other
counterpart systems, we are able to understand their significance,
thereby applying new techniques to obtain new real-time results and
solutions. Stochastic Processes and Their Applications in
Artificial Intelligence opens doors for artificial intelligence
experts to use stochastic processes as an effective tool in
real-world problems in computational biology, speech recognition,
natural language processing, and reinforcement learning. Covering
key topics such as social media, big data, and artificial
intelligence models, this reference work is ideal for
mathematicians, industry professionals, researchers, scholars,
academicians, practitioners, instructors, and students.
Photoplethysmography: Technology, Signal Analysis, and Applications
is the first comprehensive volume on the theory, principles, and
technology (sensors and electronics) of photoplethysmography (PPG).
It provides a detailed description of the current state-of-the-art
technologies/optical components enabling the extreme
miniaturization of such sensors, as well as comprehensive coverage
of PPG signal analysis techniques including machine learning and
artificial intelligence. The book also outlines the huge range of
PPG applications in healthcare, with a strong focus on the
contribution of PPG in wearable sensors and PPG for cardiovascular
assessment.
Anomaly Detection and Complex Event Processing over IoT Data
Streams: With Application to eHealth and Patient Data Monitoring
presents advanced processing techniques for IoT data streams and
the anomaly detection algorithms over them. The book brings new
advances and generalized techniques for processing IoT data
streams, semantic data enrichment with contextual information at
Edge, Fog and Cloud as well as complex event processing in IoT
applications. The book comprises fundamental models, concepts and
algorithms, architectures and technological solutions as well as
their application to eHealth. Case studies, such as the bio-metric
signals stream processing are presented -the massive amount of raw
ECG signals from the sensors are processed dynamically across the
data pipeline and classified with modern machine learning
approaches including the Hierarchical Temporal Memory and Deep
Learning algorithms. The book discusses adaptive solutions to IoT
stream processing that can be extended to different use cases from
different fields of eHealth, to enable a complex analysis of
patient data in a historical, predictive and even prescriptive
application scenarios. The book ends with a discussion on ethics,
emerging research trends, issues and challenges of IoT data stream
processing.
The medical domain is home to many critical challenges that stand
to be overcome with the use of data-driven clinical decision
support systems (CDSS), and there is a growing set of examples of
automated diagnosis, prognosis, drug design, and testing. However,
the current state of AI in medicine has been summarized as "high on
promise and relatively low on data and proof." If such problems can
be addressed, a data-driven approach will be very important to the
future of CDSSs as it simplifies the knowledge acquisition and
maintenance process, a process that is time-consuming and requires
considerable human effort. Diverse Perspectives and
State-of-the-Art Approaches to the Utilization of Data-Driven
Clinical Decision Support Systems critically reflects on the
challenges that data-driven CDSSs must address to become mainstream
healthcare systems rather than a small set of exemplars of what
might be possible. It further identifies evidence-based, successful
data-driven CDSSs. Covering topics such as automated planning,
diagnostic systems, and explainable artificial intelligence, this
premier reference source is an excellent resource for medical
professionals, healthcare administrators, IT managers, pharmacists,
students and faculty of higher education, librarians, researchers,
and academicians.
Meeting the Challenges of Data Quality Management outlines the
foundational concepts of data quality management and its
challenges. The book enables data management professionals to help
their organizations get more value from data by addressing the five
challenges of data quality management: the meaning challenge
(recognizing how data represents reality), the process/quality
challenge (creating high-quality data by design), the people
challenge (building data literacy), the technical challenge
(enabling organizational data to be accessed and used, as well as
protected), and the accountability challenge (ensuring
organizational leadership treats data as an asset). Organizations
that fail to meet these challenges get less value from their data
than organizations that address them directly. The book describes
core data quality management capabilities and introduces new and
experienced DQ practitioners to practical techniques for getting
value from activities such as data profiling, DQ monitoring and DQ
reporting. It extends these ideas to the management of data quality
within big data environments. This book will appeal to data quality
and data management professionals, especially those involved with
data governance, across a wide range of industries, as well as
academic and government organizations. Readership extends to people
higher up the organizational ladder (chief data officers, data
strategists, analytics leaders) and in different parts of the
organization (finance professionals, operations managers, IT
leaders) who want to leverage their data and their organizational
capabilities (people, processes, technology) to drive value and
gain competitive advantage. This will be a key reference for
graduate students in computer science programs which normally have
a limited focus on the data itself and where data quality
management is an often-overlooked aspect of data management
courses.
Implementation of Smart Healthcare Systems using AI, IoT, and
Blockchain provides imperative research on the development of data
fusion and analytics for healthcare and their implementation into
current issues in a real-time environment. While highlighting IoT,
bio-inspired computing, big data, and evolutionary programming, the
book explores various concepts and theories of data fusion, IoT,
and Big Data Analytics. It also investigates the challenges and
methodologies required to integrate data from multiple
heterogeneous sources, analytical platforms in healthcare sectors.
This book is unique in the way that it provides useful insights
into the implementation of a smart and intelligent healthcare
system in a post-Covid-19 world using enabling technologies like
Artificial Intelligence, Internet of Things, and blockchain in
providing transparent, faster, secure and privacy preserved
healthcare ecosystem for the masses.
|
You may like...
Oracle 12c - SQL
Joan Casteel
Paperback
(1)
R1,376
R1,275
Discovery Miles 12 750
|