|
|
Books > Computing & IT
The Beginnings of Electron Microscopy - Part 2, Volume 221 in the
Advances in Imaging and Electron Physics series, highlights new
advances in the field, with this new volume presenting interesting
chapters on Recollections from the Early Years: Canada-USA, My
Recollection of the Early History of Our Work on Electron Optics
and the Electron Microscope, Walter Hoppe (1917-1986),
Reminiscences of the Development of Electron Optics and Electron
Microscope Instrumentation in Japan, Early Electron Microscopy in
The Netherlands, L. L. Marton, 1901-1979, The Invention of the
Electron Fresnel Interference Biprism, The Development of the
Scanning Electron Microscope, and much more.
Advances in Computers, Volume 127 presents innovations in computer
hardware, software, theory, design and applications, with this
updated volume including new chapters on Edge AI, Edge Computing,
Edge Analytics, Edge Data Analytics, Edge Native Applications, Edge
Platforms, Edge Computing, IoT, Internet of Things, etc.
The Handbook on Socially Interactive Agents provides a
comprehensive overview of the research fields of Embodied
Conversational Agents Intelligent Virtual Agents and Social
Robotics. Socially Interactive Agents (SIAs) whether virtually or
physically embodied are autonomous agents that are able to perceive
an environment including people or other agents reason decide how
to interact and express attitudes such as emotions engagement or
empathy. They are capable of interacting with people and one
another in a socially intelligent manner using multimodal
communicative behaviors with the goal to support humans in various
domains.Written by international experts in their respective fields
the book summarizes research in the many important research
communities pertinent for SIAs while discussing current challenges
and future directions. The handbook provides easy access to
modeling and studying SIAs for researchers and students and aims at
further bridging the gap between the research communities involved.
In two volumes the book clearly structures the vast body of
research. The first volume starts by introducing what is involved
in SIAs research in particular research methodologies and ethical
implications of developing SIAs. It further examines research on
appearance and behavior focusing on multimodality. Finally social
cognition for SIAs is investigated using different theoretical
models and phenomena such as theory of mind or pro-sociality. The
second volume starts with perspectives on interaction examined from
different angles such as interaction in social space group
interaction or long-term interaction. It also includes an extensive
overview summarizing research and systems of human-agent platforms
and of some of the major application areas of SIAs such as
education aging support autism and games.
Cyber security is a key focus in the modern world as more private
information is stored and saved online. In order to ensure vital
information is protected from various cyber threats, it is
essential to develop a thorough understanding of technologies that
can address cyber security challenges. Artificial intelligence has
been recognized as an important technology that can be employed
successfully in the cyber security sector. Due to this, further
study on the potential uses of artificial intelligence is required.
The Handbook of Research on Cyber Security Intelligence and
Analytics discusses critical artificial intelligence technologies
that are utilized in cyber security and considers various cyber
security issues and their optimal solutions supported by artificial
intelligence. Covering a range of topics such as malware, smart
grid, data breachers, and machine learning, this major reference
work is ideal for security analysts, cyber security specialists,
data analysts, security professionals, computer scientists,
government officials, researchers, scholars, academicians,
practitioners, instructors, and students.
Artificial Neural Networks for Renewable Energy Systems and
Real-World Applications presents current trends for the solution of
complex engineering problems in the application, modeling,
analysis, and optimization of different energy systems and
manufacturing processes. With growing research catering to the
applications of neural networks in specific industrial
applications, this reference provides a single resource catering to
a broader perspective of ANN in renewable energy systems and
manufacturing processes. ANN-based methods have attracted the
attention of scientists and researchers in different engineering
and industrial disciplines, making this book a useful reference for
all researchers and engineers interested in artificial networks,
renewable energy systems, and manufacturing process analysis.
There has been a multitude of studies focused on the COVID-19
pandemic across fields and disciplines as all sectors of life have
had to adjust the way things are done and adapt to the constantly
shifting environment. These studies are crucial as they provide
support and perspectives on how things are changing and what needs
to be done to stay afloat. Connecting COVID-19-related studies and
big data analytics is crucial for the advancement of industrial
applications and research areas. Applied Big Data Analytics and Its
Role in COVID-19 Research introduces the most recent industrial
applications and research topics on COVID-19 with big data
analytics. Featuring coverage on a broad range of big data
technologies such as data gathering, artificial intelligence, smart
diagnostics, and mining mobility, this publication provides
concrete examples and cases of usage of data-driven projects in
COVID-19 research. This reference work is a vital resource for data
scientists, technical managers, researchers, scholars,
practitioners, academicians, instructors, and students.
In this book, I am going to show you everything you need to know:
1. Exactly how to set up your own portfolio of dividend stocks
2. Where to open up a brokerage account
3. How to never pay a commission when you buy or sell a stock
4. Which dividend stocks are the safest
5. Which dividend stocks to avoid (don't start investing until you read
this)
6. How to super-charge your returns
7. How to profit from a bear market
And much, much more...
The medical domain is home to many critical challenges that stand
to be overcome with the use of data-driven clinical decision
support systems (CDSS), and there is a growing set of examples of
automated diagnosis, prognosis, drug design, and testing. However,
the current state of AI in medicine has been summarized as "high on
promise and relatively low on data and proof." If such problems can
be addressed, a data-driven approach will be very important to the
future of CDSSs as it simplifies the knowledge acquisition and
maintenance process, a process that is time-consuming and requires
considerable human effort. Diverse Perspectives and
State-of-the-Art Approaches to the Utilization of Data-Driven
Clinical Decision Support Systems critically reflects on the
challenges that data-driven CDSSs must address to become mainstream
healthcare systems rather than a small set of exemplars of what
might be possible. It further identifies evidence-based, successful
data-driven CDSSs. Covering topics such as automated planning,
diagnostic systems, and explainable artificial intelligence, this
premier reference source is an excellent resource for medical
professionals, healthcare administrators, IT managers, pharmacists,
students and faculty of higher education, librarians, researchers,
and academicians.
Adversarial Robustness for Machine Learning summarizes the recent
progress on this topic and introduces popular algorithms on
adversarial attack, defense and veri?cation. Sections cover
adversarial attack, veri?cation and defense, mainly focusing on
image classi?cation applications which are the standard benchmark
considered in the adversarial robustness community. Other sections
discuss adversarial examples beyond image classification, other
threat models beyond testing time attack, and applications on
adversarial robustness. For researchers, this book provides a
thorough literature review that summarizes latest progress in the
area, which can be a good reference for conducting future research.
In addition, the book can also be used as a textbook for graduate
courses on adversarial robustness or trustworthy machine learning.
While machine learning (ML) algorithms have achieved remarkable
performance in many applications, recent studies have demonstrated
their lack of robustness against adversarial disturbance. The lack
of robustness brings security concerns in ML models for real
applications such as self-driving cars, robotics controls and
healthcare systems.
Recent years have seen a proliferation of cybersecurity guidance in
the form of government regulations and standards with which
organizations must comply. As society becomes more heavily
dependent on cyberspace, increasing levels of security measures
will need to be established and maintained to protect the
confidentiality, integrity, and availability of information; the
privacy of consumers; and the continuity of economic activity.
Compliance is a measure of the extent to which a current state is
in conformance with a desired state. The desired state is commonly
operationalized through specific business objectives, professional
standards, and regulations. Assurance services provide a means of
evaluating the level of compliance with various cybersecurity
requirements. The proposed book will summarize current
cybersecurity guidance and provide a compendium of innovative and
state-of-the-art compliance and assurance practices and tools that
can function both as a reference and pedagogical source for
practitioners and educators. This publication will provide a
synopsis of current cybersecurity guidance that organizations
should consider in establishing and updating their cybersecurity
systems. Assurance services will also be addressed so that
management and their auditors can regularly evaluate their extent
of compliance. This book should be published because its theme will
provide company management, practitioners, and academics with a
good summary of current guidance and how to conduct assurance of
appropriate compliance.
* This Revision Workbook delivers hassle-free question practice,
covering one topic per page and avoiding lengthy set up time. *
Build your confidence with guided practice questions, before moving
onto unguided questions and practice tests. * With one-to-one page
correspondence between the Workbook and the Revision Guide, this
hugely popular Revision series offers the best value available for
BTEC learners. * Covers both externally assessed Units for 2012
BTEC First in Information and Creative Technology (Units 1 and 2).
The concept of autonomic computing seeks to reduce the complexity
of pervasively ubiquitous system management and maintenance by
shifting the responsibility for low-level tasks from humans to the
system while allowing humans to concentrate on high-level tasks.
This is achieved by building self-managing systems that are
generally capable of self-configuring, self-healing,
self-optimising, and self-protecting. Trustworthy autonomic
computing technologies are being applied in datacentre and cloud
management, smart cities and autonomous systems including
driverless cars. However, there are still significant challenges to
achieving trustworthiness. This book covers challenges and
solutions in autonomic computing trustworthiness from methods and
techniques to achieve consistent and reliable system
self-management. Researchers, developers and users need to be
confident that an autonomic self-managing system will remain
correct in the face of any possible contexts and environmental
inputs. The book is aimed at researchers in autonomic computing,
autonomics and trustworthy autonomics. This will be a go-to book
for foundational knowledge, proof of concepts and novel trustworthy
autonomic techniques and approaches. It will be useful to lecturers
and students of autonomic computing, autonomics and multi-agent
systems who need an easy-to-use text with sample codes, exercises,
use-case demonstrations. This is also an ideal tutorial guide for
independent study with simple and well documented diagrams to
explain techniques and processes.
IoT-enabled Unobtrusive Surveillance Systems for Smart Campus
Safety Enables readers to understand a broad area of
state-of-the-art research in physical IoT-enabled security
IoT-enabled Unobtrusive Surveillance Systems for Smart Campus
Safety describes new techniques in unobtrusive surveillance that
enable people to act and communicate freely, while at the same time
protecting them from malevolent behavior. It begins by
characterizing the latest on surveillance systems deployed at smart
campuses, miniatures of smart cities with more demanding frameworks
that enable learning, social interaction, and creativity, and by
performing a comparative assessment in the area of unobtrusive
surveillance systems for smart campuses. A proposed taxonomy for
IoT-enabled smart campus unfolds in five research dimensions: (1)
physical infrastructure; (2) enabling technologies; (3) software
analytics; (4) system security; and (5) research methodology. By
applying this taxonomy and by adopting a weighted scoring model on
the surveyed systems, the book presents the state of the art and
then makes a comparative assessment to classify the systems.
Finally, the book extracts valuable conclusions and inferences from
this classification, providing insights and directions towards
required services offered by unobtrusive surveillance systems for
smart campuses. IoT-enabled Unobtrusive Surveillance Systems for
Smart Campus Safety includes specific discussion of: Smart campus's
prior work taxonomies and classifications, a proposed taxonomy, and
an adopted weight scoring model Personal consumer benefits and
potential social dilemmas encountered when adopting an unobtrusive
surveillance system Systems that focus on smart buildings, public
spaces, smart lighting and smart traffic lights, smart labs, and
smart campus ambient intelligence A case study of a spatiotemporal
authentication unobtrusive surveillance system for smart campus
safety and emerging issues for further research directions
IoT-enabled Unobtrusive Surveillance Systems for Smart Campus
Safety is an essential resource for computer science and
engineering academics, professionals, and every individual who is
working and doing research in the area of unobtrusive surveillance
systems and physical security to face malevolent behavior in smart
campuses.
Advances in Computers, Volume 124 presents updates on innovations
in computer hardware, software, theory, design and applications,
with this updated volume including new chapters on
Traffic-Load-Aware Virtual Channel Power-gating in
Network-on-Chips, An Efficient DVS Scheme for On-chip Networks, A
Power-Performance Balanced Network-on-Chip for Mixed CPU-GPU
Systems, Routerless Networks-on-Chip, Routing Algorithm Design for
Power- and Temperature-Aware NoCs, Approximate Communication for
Energy-Efficient Network-on-Chip, Power-Efficient NoC Design by
Partial Topology Reconfiguration, The Design of a Deflection-based
Energy-efficient On-chip Network, and Power-Gating in
Networks-on-Chip.
|
|