|
Books > Computing & IT
Information retrieval (IR) is a fundamental task in many real-world
applications such as Web search, question answering systems, and
digital libraries. The core of IR is to identify information
resources relevant to user's information need. Since there might be
more than one relevant resource, the returned result is often
organized as a ranked list of documents according to their
relevance degree against the information need. The ranking property
of IR makes it different from other tasks, and researchers have
devoted substantial efforts to develop a variety of ranking models
in IR. In recent years, the resurgence of deep learning has greatly
advanced this field and led to a hot topic named NeuIR (neural
information retrieval), especially the paradigm of pre-training
methods (PTMs). Owing to sophisticated pre-training objectives and
huge model size, pre-trained models can learn universal language
representations from massive textual data that are beneficial to
the ranking task of IR. Considering the rapid progress of this
direction, this survey provides a systematic review of PTMs in IR.
The authors present an overview of PTMs applied in different
components of an IR system, including the retrieval component and
the re-ranking component. In addition, they introduce PTMs
specifically designed for IR, and summarize available datasets as
well as benchmark leaderboards. Lastly, they discuss some open
challenges and highlight several promising directions with the hope
of inspiring and facilitating more works on these topics for future
research.
Emerging technologies in education are dramatically reshaping the
way we teach, learn, and create meaning-both formally and
informally. The use of emerging technologies within educational
contexts requires new methodological approaches to teaching,
learning, and educational research. This leads educational
technology developers, researchers, and practitioners to engage in
the creation of diverse digital learning tools that can be used in
a wide range of learning situations and scenarios. Ultimately, the
goal of today's digital learning experiences includes situational
experiences wherein learners and teachers symbiotically enroll in
meaning-making processes. Discussion, critical reflection, and
critique of these emerging technologies, tools, environments,
processes, and practices require scholars to involve themselves in
critical conversation about the challenges and promises afforded by
emerging technologies and to engage in deliberate thinking about
the critical aspects of these emerging technologies that are
drastically reshaping education. Global Education and the Impact of
Institutional Policies on Educational Technologies deepens this
discussion of emerging technologies in educational contexts and is
centered at the intersection of educational technology, learning
sciences, and socio-cultural theories. This book engages a critical
conversation that will further the discussion about the pedagogical
potential of emerging technologies in contemporary classrooms.
Covering topics such as communication networks, online learning
environments, and preservice teacher education, this text is an
essential resource for educational professionals, preservice
teachers, professors, teachers, students, and academicians.
The application of artificial intelligence technology to 5G
wireless communications is now appropriate to address the design of
optimized physical layers, complicated decision-making, network
management, and resource optimization tasks within networks. In
exploring 5G wireless technologies and communication systems,
artificial intelligence is a powerful tool and a research topic
with numerous potential fields of application that require further
study. Applications of Artificial Intelligence in Wireless
Communication Systems explores the applications of artificial
intelligence for the optimization of wireless communication
systems, including channel models, channel state estimation,
beamforming, codebook design, signal processing, and more. Covering
key topics such as neural networks, deep learning, and wireless
systems, this reference work is ideal for computer scientists,
industry professionals, researchers, academicians, scholars,
practitioners, instructors, and students.
Data Prefetching Techniques in Computer Systems, Volume 125
provides an in-depth review of the latest progress on data
prefetching research. Topics covered in this volume include
temporal prefetchers, spatial prefetchers, non-spatial-temporal
prefetchers, and evaluation of prefetchers, with insights on
possible future research direction. Specific chapters in this
release include Introduction to Data Prefetching, Spatial
Prefetching Techniques, Temporal Prefetching Techniques, Domino
prefetching scheme, Bingo prefetching method, and The Champion
prefetcher.
Advances in Computers, Volume 124 presents updates on innovations
in computer hardware, software, theory, design and applications,
with this updated volume including new chapters on
Traffic-Load-Aware Virtual Channel Power-gating in
Network-on-Chips, An Efficient DVS Scheme for On-chip Networks, A
Power-Performance Balanced Network-on-Chip for Mixed CPU-GPU
Systems, Routerless Networks-on-Chip, Routing Algorithm Design for
Power- and Temperature-Aware NoCs, Approximate Communication for
Energy-Efficient Network-on-Chip, Power-Efficient NoC Design by
Partial Topology Reconfiguration, The Design of a Deflection-based
Energy-efficient On-chip Network, and Power-Gating in
Networks-on-Chip.
Today's "machine-learning" systems, trained by data, are so
effective that we've invited them to see and hear for us-and to
make decisions on our behalf. But alarm bells are ringing. Recent
years have seen an eruption of concern as the field of machine
learning advances. When the systems we attempt to teach will not,
in the end, do what we want or what we expect, ethical and
potentially existential risks emerge. Researchers call this the
alignment problem. Systems cull resumes until, years later, we
discover that they have inherent gender biases. Algorithms decide
bail and parole-and appear to assess Black and White defendants
differently. We can no longer assume that our mortgage application,
or even our medical tests, will be seen by human eyes. And as
autonomous vehicles share our streets, we are increasingly putting
our lives in their hands. The mathematical and computational models
driving these changes range in complexity from something that can
fit on a spreadsheet to a complex system that might credibly be
called "artificial intelligence." They are steadily replacing both
human judgment and explicitly programmed software. In best-selling
author Brian Christian's riveting account, we meet the alignment
problem's "first-responders," and learn their ambitious plan to
solve it before our hands are completely off the wheel. In a
masterful blend of history and on-the ground reporting, Christian
traces the explosive growth in the field of machine learning and
surveys its current, sprawling frontier. Readers encounter a
discipline finding its legs amid exhilarating and sometimes
terrifying progress. Whether they-and we-succeed or fail in solving
the alignment problem will be a defining human story. The Alignment
Problem offers an unflinching reckoning with humanity's biases and
blind spots, our own unstated assumptions and often contradictory
goals. A dazzlingly interdisciplinary work, it takes a hard look
not only at our technology but at our culture-and finds a story by
turns harrowing and hopeful.
The damaging effects of cyberattacks to an industry like the
Cooperative Connected and Automated Mobility (CCAM) can be
tremendous. From the least important to the worst ones, one can
mention for example the damage in the reputation of vehicle
manufacturers, the increased denial of customers to adopt CCAM, the
loss of working hours (having direct impact on the European GDP),
material damages, increased environmental pollution due e.g., to
traffic jams or malicious modifications in sensors' firmware, and
ultimately, the great danger for human lives, either they are
drivers, passengers or pedestrians. Connected vehicles will soon
become a reality on our roads, bringing along new services and
capabilities, but also technical challenges and security threats.
To overcome these risks, the CARAMEL project has developed several
anti-hacking solutions for the new generation of vehicles. CARAMEL
(Artificial Intelligence-based Cybersecurity for Connected and
Automated Vehicles), a research project co-funded by the European
Union under the Horizon 2020 framework programme, is a project
consortium with 15 organizations from 8 European countries together
with 3 Korean partners. The project applies a proactive approach
based on Artificial Intelligence and Machine Learning techniques to
detect and prevent potential cybersecurity threats to autonomous
and connected vehicles. This approach has been addressed based on
four fundamental pillars, namely: Autonomous Mobility, Connected
Mobility, Electromobility, and Remote Control Vehicle. This book
presents theory and results from each of these technical
directions.
An up-to-date guide to creating your own fun and useful Raspberry
Pi (TM) programs This fully updated guide shows how to create
inventive programs and fun games on your powerful Raspberry Pi-with
no programming experience required. Programming the Raspberry Pi
(TM): Getting Started with Python, Third Edition addresses physical
changes and new setup procedures as well as OS updates to the
current version 4. You will discover how to configure hardware and
software, write Python scripts, create user-friendly GUIs, and
control external electronics. Step-by-step projects include a
digital clock prototype and a fully functioning Raspberry Pi robot.
Configure your Raspberry Pi and explore its features Start writing
and debugging Python programs Use strings, lists, functions, and
dictionaries Work with modules, classes, and methods Apply
object-oriented development methods Create user-friendly games
using Pygame Build intuitive user interfaces with guizero Interface
with hardware using the gpiozero library Attach external
electronics through the GPIO port Add powerful Web features to your
projects
This book is not deep research work, as I am not a Ph.D. professor at
any international university.
I was a teacher. I was also a real estate investor. And now I am a
fulltime writer. Nevertheless, I am also research addicted reading two
books per month.
Moreover, as I studied Macroeconomics, I found out that the world has
been threatened by a new virus, the decentralized digital virus.
Metaverse, Decentraland, blockchain, bitcoin standard, smart contracts,
protocols, nodes, tokens, and halvings suddenly invaded my eyes with
such a power that I had to understand what the hell was that about. If
you do not know what these concepts are, you are in the right place.
Some of these articles are controversial, others you might agree with,
but most of them try to explain how the world is shifting into a fully
digital mode.
Central banks and governments are trying to keep the boat afloat in a
perfect MMT style, while politicians still do not quite understand how
the moneyprinting machine works. They keep saying we need raise taxes
to pay the debt when the government is the only issuer, so it cannot
become insolvent.
With deflationary pressure from technological innovations, the need for
fresh money puts central banks in the red to control inflation.
Covid-19 hit hard on every economy, but only the issuers can control
the orchestra. Straightforwardly, as a non-native writer, I will try to
give you a perspective about how the world is changing, from analog to
digital, from the real world to the metaverse, with a fascinating
silent war between centralized money printing power and decentralized
fully digital crypto ecosystems.
Cybersecurity is vital for all businesses, regardless of sector.
With constant threats and potential online dangers, businesses must
remain aware of the current research and information available to
them in order to protect themselves and their employees.
Maintaining tight cybersecurity can be difficult for businesses as
there are so many moving parts to contend with, but remaining
vigilant and having protective measures and training in place is
essential for a successful company. The Research Anthology on
Business Aspects of Cybersecurity considers all emerging aspects of
cybersecurity in the business sector including frameworks, models,
best practices, and emerging areas of interest. This comprehensive
reference source is split into three sections with the first
discussing audits and risk assessments that businesses can conduct
to ensure the security of their systems. The second section covers
training and awareness initiatives for staff that promotes a
security culture. The final section discusses software and systems
that can be used to secure and manage cybersecurity threats.
Covering topics such as audit models, security behavior, and
insider threats, it is ideal for businesses, business
professionals, managers, security analysts, IT specialists,
executives, academicians, researchers, computer engineers, graduate
students, and practitioners.
The digital transformation of the 21st century has affected all
facets of society and has been highly advantageous in many
industries, including urban planning and regional development. The
practices, strategies, and developments surrounding urban
e-planning in particular have been constantly shifting and adapting
to new innovations as they arrive. Trends and Innovations in Urban
E-Planning provides an updated panorama of the main trends,
challenges, and recent innovations in the field of e-planning
through the critical perspectives of diverse experts. This book
adds new and updated evidence on recent changes in this field and
provides critical insights on these innovations. Covering topics
such as citizen engagement, land property management, and spatial
planning, this book is an essential resource for students and
educators of higher education, researchers, urban planners,
engineers, public officials, community groups, and academicians.
Nowadays, Virtual Reality (VR) is commonly used in various
applications including entertainment, education and training,
manufacturing, medical and rehabilitation. VR not only provides
immersive stereoscopic visualization of virtual environments and
the visualization effect and computer graphics are critical to
enhancing the engagement of participants and thus increases
education and training effectiveness. Nevertheless, constructing
realistic 3D models and scenarios for a specific application of VR
simulation is not an easy task. There are many different tools for
3D modelling such as ZBrush, Blender, SketchUp, AutoCAD,
SolidWorks, 3Ds Max, Maya, Rhino3D, CATIA, and more. Many of the
modelling tools are very professional and used for manufacturing
and product design application. The advanced features and functions
may not be applicable to different levels of users and various
specialization. This book explores the application of virtual
reality in healthcare settings. This includes 3D modelling
techniques, texturing, assigning material, and more. It allows for
not only modelling and rendering techniques, but modelling,
dressing, and animation in healthcare applications. The potential
market of readers, including those from the engineering disciplines
such as computer sciences/ computer engineering, product designers,
and more. Other potential readers are those studying nursing and
medicine, healthcare workers, and anyone interested in the
development of VR applications for industry use. In addition, this
is suitable for readers from other industries that may need to
apply virtual reality in their field.
|
You may like...
Recipes
SuzelleDIY
Paperback
R350
R323
Discovery Miles 3 230
|