|
Books > Computing & IT
The clinical use of Artificial Intelligence (AI) in radiation
oncology is in its infancy. However, it is certain that AI is
capable of making radiation oncology more precise and personalized
with improved outcomes. Radiation oncology deploys an array of
state-of-the-art technologies for imaging, treatment, planning,
simulation, targeting, and quality assurance while managing the
massive amount of data involving therapists, dosimetrists,
physicists, nurses, technologists, and managers. AI consists of
many powerful tools which can process a huge amount of
inter-related data to improve accuracy, productivity, and
automation in complex operations such as radiation oncology.This
book offers an array of AI scientific concepts, and AI technology
tools with selected examples of current applications to serve as a
one-stop AI resource for the radiation oncology community. The
clinical adoption, beyond research, will require ethical
considerations and a framework for an overall assessment of AI as a
set of powerful tools.30 renowned experts contributed to sixteen
chapters organized into six sections: Define the Future, Strategy,
AI Tools, AI Applications, and Assessment and Outcomes. The future
is defined from a clinical and a technical perspective and the
strategy discusses lessons learned from radiology experience in AI
and the role of open access data to enhance the performance of AI
tools. The AI tools include radiomics, segmentation, knowledge
representation, and natural language processing. The AI
applications discuss knowledge-based treatment planning and
automation, AI-based treatment planning, prediction of radiotherapy
toxicity, radiomics in cancer prognostication and treatment
response, and the use of AI for mitigation of error propagation.
The sixth section elucidates two critical issues in the clinical
adoption: ethical issues and the evaluation of AI as a
transformative technology.
If you look around you will find that all computer systems, from
your portable devices to the strongest supercomputers, are
heterogeneous in nature. The most obvious heterogeneity is the
existence of computing nodes of different capabilities (e.g.
multicore, GPUs, FPGAs, ...). But there are also other
heterogeneity factors that exist in computing systems, like the
memory system components, interconnection, etc. The main reason for
these different types of heterogeneity is to have good performance
with power efficiency. Heterogeneous computing results in both
challenges and opportunities. This book discusses both. It shows
that we need to deal with these challenges at all levels of the
computing stack: from algorithms all the way to process technology.
We discuss the topic of heterogeneous computing from different
angles: hardware challenges, current hardware state-of-the-art,
software issues, how to make the best use of the current
heterogeneous systems, and what lies ahead. The aim of this book is
to introduce the big picture of heterogeneous computing. Whether
you are a hardware designer or a software developer, you need to
know how the pieces of the puzzle fit together. The main goal is to
bring researchers and engineers to the forefront of the research
frontier in the new era that started a few years ago and is
expected to continue for decades. We believe that academics,
researchers, practitioners, and students will benefit from this
book and will be prepared to tackle the big wave of heterogeneous
computing that is here to stay.
Recently, artificial intelligence (AI), the internet of things
(IoT), and cognitive technologies have successfully been applied to
various research domains, including computer vision, natural
language processing, voice recognition, and more. In addition, AI
with IoT has made a significant breakthrough and a shift in
technical direction to achieve high efficiency and adaptability in
a variety of new applications. On the other hand, network design
and optimization for AI applications addresses a complementary
topic, namely the support of AI-based systems through novel
networking techniques, including new architectures, as well as
performance models for IoT systems. IoT has paved the way to a
plethora of new application domains, at the same time posing
several challenges as a multitude of devices, protocols,
communication channels, architectures, and middleware exist. Big
data generated by these devices calls for advanced learning and
data mining techniques to effectively understand, learn, and reason
with this volume of information, such as cognitive technologies.
Cognitive technologies play a major role in developing successful
cognitive systems which mimic ""cognitive"" functions associated
with human intelligence, such as ""learning"" and ""problem
solving."" Thus, there is a continuing demand for recent research
in these two linked fields. Innovations and Applications of AI,
IoT, and Cognitive Technologies discusses the latest innovations
and applications of AI, IoT, and cognitive-based smart systems. The
chapters cover the intersection of these three fields in emerging
and developed economies in terms of their respective development
situation, public policies, technologies and intellectual capital,
innovation systems, competition and strategies, marketing and
growth capability, and governance and relegation models. These
applications span areas such as healthcare, security and privacy,
industrial systems, multidisciplinary sciences, and more. This book
is ideal for technologists, IT specialists, policymakers,
government officials, academics, students, and practitioners
interested in the experiences of innovations and applications of
AI, IoT, and cognitive technologies.
In recent years, smart cities have been an emerging area of
interest across the world. Due to this, numerous technologies and
tools, such as building information modeling (BIM) and digital
twins, have been developed to help achieve smart cities. To ensure
research is continuously up to date and new technologies are
considered within the field, further study is required. The
Research Anthology on BIM and Digital Twins in Smart Cities
considers the uses, challenges, and opportunities of BIM and
digital twins within smart cities. Covering key topics such as
data, design, urban areas, technology, and sustainability, this
major reference work is ideal for industry professionals,
government officials, computer scientists, policymakers,
researchers, scholars, practitioners, instructors, and students.
The Etch-a-Sketch and Other Fun Programs is a collection of Apple
II software programmed by a student in the 1980s. BASIC and machine
language programming were once taught in schools, and here you'll
find a variety of useful graphics, education, utility, and game
software. The author also shares stories about his programming
experiences in school. Features 13 Programs Including: - The
Etch-a-Sketch - fun drawing with keyboard, joystick, and sound. -
The Apple - the six color logo in beautiful lo-res. - Annual Graph
Matrix - graph monthly amounts for one year. - Compound Interest -
calculate investment interest over time. - States & Capitals -
learn about the U.S. through quizzes. - H - a powerful HELLO
program for launching files in DOS 3.3. - Random Access Filer - a
simple text database for contacts. - Tunnel Race - dodge obstacles
through a text-based cavern. - Joystick Calibration - optimize your
entertainment device.
Social media has emerged as a powerful tool that reaches a wide
audience with minimum time and effort. It has a diverse role in
society and human life and can boost the visibility of information
that allows citizens the ability to play a vital role in creating
and fostering social change. This practice can have both positive
and negative consequences on society. Examining the Roles of IT and
Social Media in Democratic Development and Social Change is a
collection of innovative research on the methods and applications
of social media within community development and democracy. While
highlighting topics including information capitalism, ethical
issues, and e-governance, this book is ideally designed for social
workers, politicians, public administrators, sociologists,
journalists, policymakers, government administrators, academicians,
researchers, and students seeking current research on social
advancement and change through social media and technology.
Artificial intelligence has been utilized in a diverse range of
industries as more people and businesses discover its many uses and
applications. A current field of study that requires more
attention, as there is much opportunity for improvement, is the use
of artificial intelligence within literary works and social media
analysis. Artificial Intelligence Applications in Literary Works
and Social Media presents contemporary developments in the adoption
of artificial intelligence in textual analysis of literary works
and social media and introduces current approaches, techniques, and
practices in data science that are implemented to scrap and analyze
text data. This book initiates a new multidisciplinary field that
is the combination of artificial intelligence, data science, social
science, literature, and social media study. Covering key topics
such as opinion mining, sentiment analysis, and machine learning,
this reference work is ideal for computer scientists, industry
professionals, researchers, scholars, practitioners, academicians,
instructors, and students.
Edward Snowden, the man who risked everything to expose the US government’s system of mass surveillance, reveals for the first time the story of his life, including how he helped to build that system and what motivated him to try to bring it down.
In 2013, twenty-nine-year-old Edward Snowden shocked the world when he broke with the American intelligence establishment and revealed that the United States government was secretly pursuing the means to collect every single phone call, text message, and email. The result would be an unprecedented system of mass surveillance with the ability to pry into the private lives of every person on earth. Six years later, Snowden reveals for the very first time how he helped to build this system and why he was moved to expose it.
Spanning the bucolic Beltway suburbs of his childhood and the clandestine CIA and NSA postings of his adulthood, Permanent Record is the extraordinary account of a bright young man who grew up online – a man who became a spy, a whistleblower, and, in exile, the Internet’s conscience. Written with wit, grace, passion, and an unflinching candor, Permanent Record is a crucial memoir of our digital age and destined to be a classic.
Industrial internet of things (IIoT) is changing the face of
industry by completely redefining the way stakeholders,
enterprises, and machines connect and interact with each other in
the industrial digital ecosystem. Smart and connected factories, in
which all the machinery transmits real-time data, enable industrial
data analytics for improving operational efficiency, productivity,
and industrial processes, thus creating new business opportunities,
asset utilization, and connected services. IIoT leads factories to
step out of legacy environments and arcane processes towards open
digital industrial ecosystems. Innovations in the Industrial
Internet of Things (IIoT) and Smart Factory is a pivotal reference
source that discusses the development of models and algorithms for
predictive control of industrial operations and focuses on
optimization of industrial operational efficiency, rationalization,
automation, and maintenance. While highlighting topics such as
artificial intelligence, cyber security, and data collection, this
book is ideally designed for engineers, manufacturers,
industrialists, managers, IT consultants, practitioners, students,
researchers, and industrial industry professionals.
There is a significant deficiency among contemporary medicine
practices reflected by experts making medical decisions for a large
proportion of the population for which no or minimal data exists.
Fortunately, our capacity to procure and apply such information is
rapidly rising. As medicine becomes more individualized, the
implementation of health IT and data interoperability become
essential components to delivering quality healthcare. Quality
Assurance in the Era of Individualized Medicine is a collection of
innovative research on the methods and utilization of digital
readouts to fashion an individualized therapy instead of a
mass-population-directed strategy. While highlighting topics
including assistive technologies, patient management, and clinical
practices, this book is ideally designed for health professionals,
doctors, nurses, hospital management, medical administrators, IT
specialists, data scientists, researchers, academicians, and
students.
Explore everything you need to know to set up secure remote access,
harden your firewall deployment, and protect against phishing Key
Features Learn the ins and outs of log forwarding and
troubleshooting issues Set up GlobalProtect satellite connections,
configure site-to-site VPNs, and troubleshoot LSVPN issues Gain an
in-depth understanding of user credential detection to prevent data
leaks Book DescriptionThis book builds on the content found in
Mastering Palo Alto Networks, focusing on the different methods of
establishing remote connectivity, automating log actions, and
protecting against phishing attacks through user credential
detection. Complete with step-by-step instructions, practical
examples, and troubleshooting tips, you will gain a solid
understanding of how to configure and deploy Palo Alto Networks
remote access products. As you advance, you will learn how to
design, deploy, and troubleshoot large-scale end-to-end user VPNs.
Later, you will explore new features and discover how to
incorporate them into your environment. By the end of this Palo
Alto Networks book, you will have mastered the skills needed to
design and configure SASE-compliant remote connectivity and prevent
credential theft with credential detection. What you will learn
Understand how log forwarding is configured on the firewall Focus
on effectively enabling remote access Explore alternative ways for
connecting users and remote networks Protect against phishing with
credential detection Understand how to troubleshoot complex issues
confidently Strengthen the security posture of your firewalls Who
this book is forThis book is for anyone who wants to learn more
about remote access for users and remote locations by using
GlobalProtect and Prisma access and by deploying Large Scale VPN.
Basic knowledge of Palo Alto Networks, network protocols, and
network design will be helpful, which is why reading Mastering Palo
Alto Networks is recommended first to help you make the most of
this book.
|
You may like...
Oracle 12c - SQL
Joan Casteel
Paperback
(1)
R1,321
R1,139
Discovery Miles 11 390
MIS
Hossein Bidgoli
Paperback
R1,163
R1,008
Discovery Miles 10 080
|