|
Books > Computing & IT
Today's "machine-learning" systems, trained by data, are so
effective that we've invited them to see and hear for us-and to
make decisions on our behalf. But alarm bells are ringing. Recent
years have seen an eruption of concern as the field of machine
learning advances. When the systems we attempt to teach will not,
in the end, do what we want or what we expect, ethical and
potentially existential risks emerge. Researchers call this the
alignment problem. Systems cull resumes until, years later, we
discover that they have inherent gender biases. Algorithms decide
bail and parole-and appear to assess Black and White defendants
differently. We can no longer assume that our mortgage application,
or even our medical tests, will be seen by human eyes. And as
autonomous vehicles share our streets, we are increasingly putting
our lives in their hands. The mathematical and computational models
driving these changes range in complexity from something that can
fit on a spreadsheet to a complex system that might credibly be
called "artificial intelligence." They are steadily replacing both
human judgment and explicitly programmed software. In best-selling
author Brian Christian's riveting account, we meet the alignment
problem's "first-responders," and learn their ambitious plan to
solve it before our hands are completely off the wheel. In a
masterful blend of history and on-the ground reporting, Christian
traces the explosive growth in the field of machine learning and
surveys its current, sprawling frontier. Readers encounter a
discipline finding its legs amid exhilarating and sometimes
terrifying progress. Whether they-and we-succeed or fail in solving
the alignment problem will be a defining human story. The Alignment
Problem offers an unflinching reckoning with humanity's biases and
blind spots, our own unstated assumptions and often contradictory
goals. A dazzlingly interdisciplinary work, it takes a hard look
not only at our technology but at our culture-and finds a story by
turns harrowing and hopeful.
The damaging effects of cyberattacks to an industry like the
Cooperative Connected and Automated Mobility (CCAM) can be
tremendous. From the least important to the worst ones, one can
mention for example the damage in the reputation of vehicle
manufacturers, the increased denial of customers to adopt CCAM, the
loss of working hours (having direct impact on the European GDP),
material damages, increased environmental pollution due e.g., to
traffic jams or malicious modifications in sensors' firmware, and
ultimately, the great danger for human lives, either they are
drivers, passengers or pedestrians. Connected vehicles will soon
become a reality on our roads, bringing along new services and
capabilities, but also technical challenges and security threats.
To overcome these risks, the CARAMEL project has developed several
anti-hacking solutions for the new generation of vehicles. CARAMEL
(Artificial Intelligence-based Cybersecurity for Connected and
Automated Vehicles), a research project co-funded by the European
Union under the Horizon 2020 framework programme, is a project
consortium with 15 organizations from 8 European countries together
with 3 Korean partners. The project applies a proactive approach
based on Artificial Intelligence and Machine Learning techniques to
detect and prevent potential cybersecurity threats to autonomous
and connected vehicles. This approach has been addressed based on
four fundamental pillars, namely: Autonomous Mobility, Connected
Mobility, Electromobility, and Remote Control Vehicle. This book
presents theory and results from each of these technical
directions.
An up-to-date guide to creating your own fun and useful Raspberry
Pi (TM) programs This fully updated guide shows how to create
inventive programs and fun games on your powerful Raspberry Pi-with
no programming experience required. Programming the Raspberry Pi
(TM): Getting Started with Python, Third Edition addresses physical
changes and new setup procedures as well as OS updates to the
current version 4. You will discover how to configure hardware and
software, write Python scripts, create user-friendly GUIs, and
control external electronics. Step-by-step projects include a
digital clock prototype and a fully functioning Raspberry Pi robot.
Configure your Raspberry Pi and explore its features Start writing
and debugging Python programs Use strings, lists, functions, and
dictionaries Work with modules, classes, and methods Apply
object-oriented development methods Create user-friendly games
using Pygame Build intuitive user interfaces with guizero Interface
with hardware using the gpiozero library Attach external
electronics through the GPIO port Add powerful Web features to your
projects
This book is not deep research work, as I am not a Ph.D. professor at
any international university.
I was a teacher. I was also a real estate investor. And now I am a
fulltime writer. Nevertheless, I am also research addicted reading two
books per month.
Moreover, as I studied Macroeconomics, I found out that the world has
been threatened by a new virus, the decentralized digital virus.
Metaverse, Decentraland, blockchain, bitcoin standard, smart contracts,
protocols, nodes, tokens, and halvings suddenly invaded my eyes with
such a power that I had to understand what the hell was that about. If
you do not know what these concepts are, you are in the right place.
Some of these articles are controversial, others you might agree with,
but most of them try to explain how the world is shifting into a fully
digital mode.
Central banks and governments are trying to keep the boat afloat in a
perfect MMT style, while politicians still do not quite understand how
the moneyprinting machine works. They keep saying we need raise taxes
to pay the debt when the government is the only issuer, so it cannot
become insolvent.
With deflationary pressure from technological innovations, the need for
fresh money puts central banks in the red to control inflation.
Covid-19 hit hard on every economy, but only the issuers can control
the orchestra. Straightforwardly, as a non-native writer, I will try to
give you a perspective about how the world is changing, from analog to
digital, from the real world to the metaverse, with a fascinating
silent war between centralized money printing power and decentralized
fully digital crypto ecosystems.
Cybersecurity is vital for all businesses, regardless of sector.
With constant threats and potential online dangers, businesses must
remain aware of the current research and information available to
them in order to protect themselves and their employees.
Maintaining tight cybersecurity can be difficult for businesses as
there are so many moving parts to contend with, but remaining
vigilant and having protective measures and training in place is
essential for a successful company. The Research Anthology on
Business Aspects of Cybersecurity considers all emerging aspects of
cybersecurity in the business sector including frameworks, models,
best practices, and emerging areas of interest. This comprehensive
reference source is split into three sections with the first
discussing audits and risk assessments that businesses can conduct
to ensure the security of their systems. The second section covers
training and awareness initiatives for staff that promotes a
security culture. The final section discusses software and systems
that can be used to secure and manage cybersecurity threats.
Covering topics such as audit models, security behavior, and
insider threats, it is ideal for businesses, business
professionals, managers, security analysts, IT specialists,
executives, academicians, researchers, computer engineers, graduate
students, and practitioners.
The digital transformation of the 21st century has affected all
facets of society and has been highly advantageous in many
industries, including urban planning and regional development. The
practices, strategies, and developments surrounding urban
e-planning in particular have been constantly shifting and adapting
to new innovations as they arrive. Trends and Innovations in Urban
E-Planning provides an updated panorama of the main trends,
challenges, and recent innovations in the field of e-planning
through the critical perspectives of diverse experts. This book
adds new and updated evidence on recent changes in this field and
provides critical insights on these innovations. Covering topics
such as citizen engagement, land property management, and spatial
planning, this book is an essential resource for students and
educators of higher education, researchers, urban planners,
engineers, public officials, community groups, and academicians.
Nowadays, Virtual Reality (VR) is commonly used in various
applications including entertainment, education and training,
manufacturing, medical and rehabilitation. VR not only provides
immersive stereoscopic visualization of virtual environments and
the visualization effect and computer graphics are critical to
enhancing the engagement of participants and thus increases
education and training effectiveness. Nevertheless, constructing
realistic 3D models and scenarios for a specific application of VR
simulation is not an easy task. There are many different tools for
3D modelling such as ZBrush, Blender, SketchUp, AutoCAD,
SolidWorks, 3Ds Max, Maya, Rhino3D, CATIA, and more. Many of the
modelling tools are very professional and used for manufacturing
and product design application. The advanced features and functions
may not be applicable to different levels of users and various
specialization. This book explores the application of virtual
reality in healthcare settings. This includes 3D modelling
techniques, texturing, assigning material, and more. It allows for
not only modelling and rendering techniques, but modelling,
dressing, and animation in healthcare applications. The potential
market of readers, including those from the engineering disciplines
such as computer sciences/ computer engineering, product designers,
and more. Other potential readers are those studying nursing and
medicine, healthcare workers, and anyone interested in the
development of VR applications for industry use. In addition, this
is suitable for readers from other industries that may need to
apply virtual reality in their field.
Ethical Practice of Statistics and Data Science is intended to
prepare people to fully assume their responsibilities to practice
statistics and data science ethically. Aimed at early career
professionals, practitioners, and mentors or supervisors of
practitioners, the book supports the ethical practice of statistics
and data science, with an emphasis on how to earn the designation
of, and recognize, "the ethical practitioner". The book features 47
case studies, each mapped to the Data Science Ethics Checklist
(DSEC); Data Ethics Framework (DEFW); the American Statistical
Association (ASA) Ethical Guidelines for Statistical Practice; and
the Association of Computing Machinery (ACM) Code of Ethics. It is
necessary reading for students enrolled in any data intensive
program, including undergraduate or graduate degrees in
(bio-)statistics, business/analytics, or data science. Managers,
leaders, supervisors, and mentors who lead data-intensive teams in
government, industry, or academia would also benefit greatly from
this book. This is a companion volume to Ethical Reasoning For A
Data-Centered World, also published by Ethics International Press
(2022). These are the first and only books to be based on, and to
provide guidance to, the ASA and ACM Ethical Guidelines/Code of
Ethics.
The artificial intelligence subset machine learning has become a
popular technique in professional fields as many are finding new
ways to apply this trending technology into their everyday
practices. Two fields that have majorly benefited from this are
pattern recognition and information security. The ability of these
intelligent algorithms to learn complex patterns from data and
attain new performance techniques has created a wide variety of
uses and applications within the data security industry. There is a
need for research on the specific uses machine learning methods
have within these fields, along with future perspectives. Machine
Learning Techniques for Pattern Recognition and Information
Security is a collection of innovative research on the current
impact of machine learning methods within data security as well as
its various applications and newfound challenges. While
highlighting topics including anomaly detection systems,
biometrics, and intrusion management, this book is ideally designed
for industrial experts, researchers, IT professionals, network
developers, policymakers, computer scientists, educators, and
students seeking current research on implementing machine learning
tactics to enhance the performance of information security.
Every day approximately three-hundred thousand to four-hundred
thousand new malware are registered, many of them being adware and
variants of previously known malware. Anti-virus companies and
researchers cannot deal with such a deluge of malware - to analyze
and build patches. The only way to scale the efforts is to build
algorithms to enable machines to analyze malware and classify and
cluster them to such a level of granularity that it will enable
humans (or machines) to gain critical insights about them and build
solutions that are specific enough to detect and thwart existing
malware and generic-enough to thwart future variants. Advances in
Malware and Data-Driven Network Security comprehensively covers
data-driven malware security with an emphasis on using statistical,
machine learning, and AI as well as the current trends in
ML/statistical approaches to detecting, clustering, and
classification of cyber-threats. Providing information on advances
in malware and data-driven network security as well as future
research directions, it is ideal for graduate students,
academicians, faculty members, scientists, software developers,
security analysts, computer engineers, programmers, IT specialists,
and researchers who are seeking to learn and carry out research in
the area of malware and data-driven network security.
Affective computing is a nascent field situated at the intersection
of artificial intelligence with social and behavioral science. It
studies how human emotions are perceived and expressed, which then
informs the design of intelligent agents and systems that can
either mimic this behavior to improve their intelligence or
incorporate such knowledge to effectively understand and
communicate with their human collaborators. Affective computing
research has recently seen significant advances and is making a
critical transformation from exploratory studies to real-world
applications in the emerging research area known as applied
affective computing. This book offers readers an overview of the
state-of-the-art and emerging themes in affective computing,
including a comprehensive review of the existing approaches to
affective computing systems and social signal processing. It
provides in-depth case studies of applied affective computing in
various domains, such as social robotics and mental well-being. It
also addresses ethical concerns related to affective computing and
how to prevent misuse of the technology in research and
applications. Further, this book identifies future directions for
the field and summarizes a set of guidelines for developing
next-generation affective computing systems that are effective,
safe, and human-centered. For researchers and practitioners new to
affective computing, this book will serve as an introduction to the
field to help them in identifying new research topics or developing
novel applications. For more experienced researchers and
practitioners, the discussions in this book provide guidance for
adopting a human-centered design and development approach to
advance affective computing.
In recent years, falsification and digital modification of video
clips, images, as well as textual contents have become widespread
and numerous, especially when deepfake technologies are adopted in
many sources. Due to adopted deepfake techniques, a lot of content
currently cannot be recognized from its original sources. As a
result, the field of study previously devoted to general multimedia
forensics has been revived. The Handbook of Research on Advanced
Practical Approaches to Deepfake Detection and Applications
discusses the recent techniques and applications of illustration,
generation, and detection of deepfake content in multimedia. It
introduces the techniques and gives an overview of deepfake
applications, types of deepfakes, the algorithms and applications
used in deepfakes, recent challenges and problems, and practical
applications to identify, generate, and detect deepfakes. Covering
topics such as anomaly detection, intrusion detection, and security
enhancement, this major reference work is a comprehensive resource
for cyber security specialists, government officials, law
enforcement, business leaders, students and faculty of higher
education, librarians, researchers, and academicians.
Quantum computing is radically different from the conventional
approach of transforming bits strings from one set of 0's and 1's
to another. With quantum computing, everything changes. The physics
that we use to understand bits of information and the devices that
manipulate them are totally different. The way in which we build
such devices is different, requiring new materials, new design
rules and new processor architectures. Finally, the way we program
these systems is entirely different. Quantum engineering is a
revolutionary approach to quantum technology. It encompasses both
fundamental physics and the broad engineering skill-set necessary
to meet the practical challenges of the future. The proposed book
will cover the high-quality reviewed book chapters on original
research & innovations and compelling insights in Quantum
Computing and Engineering. Data scientists, Engineers, Industry,
researchers and students working in the field of quantum computing
and its allied research will benefit greatly from this publication.
|
|