Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Applications of computing > Artificial intelligence > General
This book examines the methodological foundations of the Big Data-driven world, formulates its concept within the frameworks of modern control methods and theories, and approaches the peculiarities of Control Technologies as a specific sphere of the Big Data-driven world, distinguished in the modern Digital Economy. The book studies the genesis of mathematical and information methods' transition from data analysis & processing to knowledge discovery and predictive analytics in the 21st century. In addition, it analyzes the conditions of development and implementation of Big Data analysis approaches in investigative activities and determines the role and meaning of global networks as platforms for the establishment of legislation and regulations in the Big Data-driven world. The book examines that world through the prism of Legislation Issues, substantiate the scientific and methodological approaches to studying modern mechanisms of terrorism and extremism counteraction in the conditions of new challenges of dissemination and accessibility of socially dangerous information. Systematization of successful experience of the Big Data solutions implementation in the different countries and analyze causal connections of the Digital Economy formation from the positions of new technological challenges is performed. The book's target audience includes scientists, students, PhD and Master students who conduct scientific research on the topic of Big Data not only in the field of IT& data science, but also in connection with legislative regulation aspects of the modern information society. It also includes practitioners and experts, as well as state authorities and representatives of international organizations interested in creating mechanisms for implementing Digital Economy projects in the Big Data-driven world.
The proceedings present selected research papers from the CIAC2019, held in Jiangsu, China on September 20-22, 2019. It covers a wide range of topics including intelligent control, robotics, artificial intelligence, pattern recognition, unmanned systems, IoT and machine learning. It includes original research and the latest advances in the field of intelligent automation. Engineers and researchers from academia, industry, and government can gain valuable insights into solutions combining ideas from multiple disciplines in this field.
Taking inspiration from self-awareness in humans, this book introduces the new notion of computational self-awareness as a fundamental concept for designing and operating computing systems. The basic ability of such self-aware computing systems is to collect information about their state and progress, learning and maintaining models containing knowledge that enables them to reason about their behaviour. Self-aware computing systems will have the ability to utilise this knowledge to effectively and autonomously adapt and explain their behaviour, in changing conditions. This book addresses these fundamental concepts from an engineering perspective, aiming at developing primitives for building systems and applications. It will be of value to researchers, professionals and graduate students in computer science and engineering.
This book presents advanced control techniques that use neural networks to deal with grid disturbances in the context renewable energy sources, and to enhance low-voltage ride-through capacity, which is a vital in terms of ensuring that the integration of distributed energy resources into the electrical power network. It presents modern control algorithms based on neural identification for different renewable energy sources, such as wind power, which uses doubly-fed induction generators, solar power, and battery banks for storage. It then discusses the use of the proposed controllers to track doubly-fed induction generator dynamics references: DC voltage, grid power factor, and stator active and reactive power, and the use of simulations to validate their performance. Further, it addresses methods of testing low-voltage ride-through capacity enhancement in the presence of grid disturbances, as well as the experimental validation of the controllers under both normal and abnormal grid conditions. The book then describes how the proposed control schemes are extended to control a grid-connected microgrid, and the use of an IEEE 9-bus system to evaluate their performance and response in the presence of grid disturbances. Lastly, it examines the real-time simulation of the entire system under normal and abnormal conditions using an Opal-RT simulator.
This book presents the combined proceedings of the 7th International Conference on Computer Science and its Applications (CSA-15) and the International Conference on Ubiquitous Information Technologies and Applications (CUTE 2015), both held in Cebu, Philippines, December 15 - 17, 2015. The aim of these two meetings was to promote discussion and interaction among academics, researchers and professionals in the field of computer science covering topics including mobile computing, security and trust management, multimedia systems and devices, networks and communications, databases and data mining, and ubiquitous computing technologies such as ubiquitous communication and networking, ubiquitous software technology, ubiquitous systems and applications, security and privacy. These proceedings reflect the state-of-the-art in the development of computational methods, numerical simulations, error and uncertainty analysis and novel applications of new processing techniques in engineering, science, and other disciplines related to computer science.
This book shows cognitive scientists in training how mathematics, computer science and science can be usefully and seamlessly intertwined. It is a follow-up to the first two volumes on mathematics for cognitive scientists, and includes the mathematics and computational tools needed to understand how to compute the terms in the Fourier series expansions that solve the cable equation. The latter is derived from first principles by going back to cellular biology and the relevant biophysics. A detailed discussion of ion movement through cellular membranes, and an explanation of how the equations that govern such ion movement leading to the standard transient cable equation are included. There are also solutions for the cable model using separation of variables, as well an explanation of why Fourier series converge and a description of the implementation of MatLab tools to compute the solutions. Finally, the standard Hodgkin - Huxley model is developed for an excitable neuron and is solved using MatLab.
This book presents a comprehensive overview of security issues in Cyber Physical Systems (CPSs), by analyzing the issues and vulnerabilities in CPSs and examining state of the art security measures. Furthermore, this book proposes various defense strategies including intelligent attack and anomaly detection algorithms. Today's technology is continually evolving towards interconnectivity among devices. This interconnectivity phenomenon is often referred to as Internet of Things (IoT). IoT technology is used to enhance the performance of systems in many applications. This integration of physical and cyber components within a system is associated with many benefits; these systems are often referred to as Cyber Physical Systems (CPSs). The CPSs and IoT technologies are used in many industries critical to our daily lives. CPSs have the potential to reduce costs, enhance mobility and independence of patients, and reach the body using minimally invasive techniques. Although this interconnectivity of devices can pave the road for immense advancement in technology and automation, the integration of network components into any system increases its vulnerability to cyber threats. Using internet networks to connect devices together creates access points for adversaries. Considering the critical applications of some of these devices, adversaries have the potential of exploiting sensitive data and interrupting the functionality of critical infrastructure. Practitioners working in system security, cyber security & security and privacy will find this book valuable as a reference. Researchers and scientists concentrating on computer systems, large-scale complex systems, and artificial intelligence will also find this book useful as a reference.
This book provides an opportunity for investigators, government officials, systems scientists, strategists, assurance researchers, owners, operators and maintainers of large, complex and advanced systems and infrastructures to update their knowledge with the state of best practice in the challenging domains whilst networking with the leading representatives, researchers and solution providers. Drawing on 12 years of successful events on information security, digital forensics and cyber-crime, the 13th ICGS3-20 conference aims to provide attendees with an information-packed agenda with representatives from across the industry and the globe. The challenges of complexity, rapid pace of change and risk/opportunity issues associated with modern products, systems, special events and infrastructures. In an era of unprecedented volatile, political and economic environment across the world, computer-based systems face ever more increasing challenges, disputes and responsibilities, and whilst the Internet has created a global platform for the exchange of ideas, goods and services, it has also created boundless opportunities for cyber-crime. As an increasing number of large organizations and individuals use the Internet and its satellite mobile technologies, they are increasingly vulnerable to cyber-crime threats. It is therefore paramount that the security industry raises its game to combat these threats. Whilst there is a huge adoption of technology and smart home devices, comparably, there is a rise of threat vector in the abuse of the technology in domestic violence inflicted through IoT too. All these are an issue of global importance as law enforcement agencies all over the world are struggling to cope.
This book presents new findings in industrial cyber-physical system design and control for various domains, as well as their social and economic impacts on society. Industry 4.0 requires new approaches in the context of secure connections, control, and maintenance of cyber-physical systems as well as enhancing their interaction with humans. The book focuses on open issues of cyber-physical system control and its usage, discussing implemented breakthrough systems, models, programs, and methods that could be used in industrial processes for the control, condition assessment, diagnostics, prognostication, and proactive maintenance of cyber-physical systems. Further, it addresses the topic of ensuring the cybersecurity of industrial cyber-physical systems and proposes new, reliable solutions. The authors also examine the impact of university courses on the performance of industrial complexes, and the organization of education for the development of cyber-physical systems. The book is intended for practitioners, enterprise representatives, scientists, students, and Ph.D. and master's students conducting research in the area of cyber-physical system development and implementation in various domains.
This book presents the proceedings of the International Science and Technology Conference "FarEastCon 2019," which took place on October 1-4, 2019, in Vladivostok, Russian Federation. The conference provided a platform for gathering expert opinions on projects and initiatives aimed at the implementation of far-sighted scientific research and development, and allowed current theoretical and practical advances to be shared with the broader research community. Featuring selected papers from the conference, this book will be of interest to experts in various fields whose work involves developing innovative solutions and increasing the efficiency of economic activities.
This book describes recent developments in a wide range of areas, including the modeling, analysis and control of dynamical systems, and explores related applications. The book provided a forum where researchers have shared their ideas, results on theory, and experiments in application problems. The current literature devoted to dynamical systems is quite large, and the authors' choice for the considered topics was motivated by the following considerations. Firstly, the mathematical jargon for systems theory remains quite complex and the authors feel strongly that they have to maintain connections between the people of this research field. Secondly, dynamical systems cover a wider range of applications, including engineering, life sciences and environment. The authors consider that the book is an important contribution to the state of the art in the fuzzy and dynamical systems areas.
This book describes how the principle of self-sufficiency can be applied to a reconfigurable modular robotic organism. It shows the design considerations for a novel REPLICATOR robotic platform, both hardware and software, featuring the behavioral characteristics of social insect colonies. Following a comprehensive overview of some of the bio-inspired techniques already available, and of the state-of-the-art in re-configurable modular robotic systems, the book presents a novel power management system with fault-tolerant energy sharing, as well as its implementation in the REPLICATOR robotic modules. In addition, the book discusses, for the first time, the concept of "artificial energy homeostasis" in the context of a modular robotic organism, and shows its verification on a custom-designed simulation framework in different dynamic power distribution and fault tolerance scenarios. This book offers an ideal reference guide for both hardware engineers and software developers involved in the design and implementation of autonomous robotic systems.
This book delivers a definite and compact knowledge on how hybridization can help improving the quality of computer classification systems. In order to make readers clearly realize the knowledge of hybridization, this book primarily focuses on introducing the different levels of hybridization and illuminating what problems we will face with as dealing with such projects. In the first instance the data and knowledge incorporated in hybridization were the action points, and then a still growing up area of classifier systems known as combined classifiers was considered. This book comprises the aforementioned state-of-the-art topics and the latest research results of the author and his team from Department of Systems and Computer Networks, Wroclaw University of Technology, including as classifier based on feature space splitting, one-class classification, imbalance data, and data stream classification.
This book presents recent research on the evolution of artificial neural development, and searches for learning genes. It is fascinating to see how all biological cells share virtually the same traits, but humans have a decided edge over other species when it comes to intelligence. Although DNA decides the form each particular species takes, does it also account for intelligent behaviour in living beings? The authors explore the factors that are perceived as intelligent behaviour in living beings and the incorporation of these factors in machines using genetic programming, which ultimately provides a platform for exploring the possibility of machines that can learn by themselves, i.e. that can "learn how to learn". The book will be of interest not only to the specialized scientific community pursuing machine intelligence, but also general readers who would like to know more about the incorporation of intelligent behaviour in machines, inspired by the human brain.
The Soft Computing techniques, which are based on the information processing of biological systems are now massively used in the area of pattern recognition, making prediction & planning, as well as acting on the environment. Ideally speaking, soft computing is not a subject of homogeneous concepts and techniques; rather, it is an amalgamation of distinct methods that confirms to its guiding principle. At present, the main aim of soft computing is to exploit the tolerance for imprecision and uncertainty to achieve tractability, robustness and low solutions cost. The principal constituents of soft computing techniques are probabilistic reasoning, fuzzy logic, neuro-computing, genetic algorithms, belief networks, chaotic systems, as well as learning theory. This book covers contributions from various authors to demonstrate the use of soft computing techniques in various applications of engineering.
This book presents a unified framework, based on specialized evolutionary algorithms, for the global induction of various types of classification and regression trees from data. The resulting univariate or oblique trees are significantly smaller than those produced by standard top-down methods, an aspect that is critical for the interpretation of mined patterns by domain analysts. The approach presented here is extremely flexible and can easily be adapted to specific data mining applications, e.g. cost-sensitive model trees for financial data or multi-test trees for gene expression data. The global induction can be efficiently applied to large-scale data without the need for extraordinary resources. With a simple GPU-based acceleration, datasets composed of millions of instances can be mined in minutes. In the event that the size of the datasets makes the fastest memory computing impossible, the Spark-based implementation on computer clusters, which offers impressive fault tolerance and scalability potential, can be applied.
This book presents a novel framework, known as Active Robust Optimization, which provides the tools for evaluating, comparing and optimizing changeable products. Since any product that can change its configuration during normal operation may be considered a "changeable product," the framework is widely applicable. Further, the methodology enables designers to use adaptability to deal with uncertainties and so avoid over-conservative designs. Offering a comprehensive overview of the framework, including its unique features, such as its ability to optimally respond to uncertain situations, the book also defines a new class of optimization problem and examines the effects of changes in various parameters on their solution. Lastly, it discusses innovative approaches for solving the problem and demonstrates these with two examples from different fields in engineering design: optimization of an optical table and optimization of a gearbox.
This book describes an effective framework for setting the right process parameters and new mold design to reduce the current plastic defects in injection molding. It presents a new approach for the optimization of injection molding process via (i) a new mold runner design which leads to 20 percent reduction in scrap rate, 2.5 percent reduction in manufacturing time, and easier ejection of injected part, (ii) a new mold gate design which leads to less plastic defects; and (iii) the introduction of a number of promising alternatives with high moldability indices. Besides presenting important developments of relevance academic research, the book also includes useful information for people working in the injection molding industry, especially in the green manufacturing field.
This book explores the inputs with regard to individuals and companies who have developed technologies and innovative solutions, bioinformatics, datasets, apps for diagnosis, etc., that can be leveraged for strengthening the fight against coronavirus. It focuses on technology solutions to stop Covid-19 outbreak and mitigate the risk. The book contains innovative ideas from active researchers who are presently working to find solutions, and they give insights to other researchers to explore the innovative methods and predictive modeling techniques. The novel applications and techniques of established technologies like artificial intelligence (AI), Internet of things (IoT), big data, computer vision and machine learning are discussed to fight the spread of this disease, Covid-19. This pandemic has triggered an unprecedented demand for digital health technology solutions and unleashing information technology to win over this pandemic.
This book mainly focuses on cloud security and high performance computing for cloud auditing. The book discusses emerging challenges and techniques developed for high performance semantic cloud auditing, and presents the state of the art in cloud auditing, computing and security techniques with focus on technical aspects and feasibility of auditing issues in federated cloud computing environments. In summer 2011, the United States Air Force Research Laboratory (AFRL) CyberBAT Cloud Security and Auditing Team initiated the exploration of the cloud security challenges and future cloud auditing research directions that are covered in this book. This work was supported by the United States government funds from the Air Force Office of Scientific Research (AFOSR), the AFOSR Summer Faculty Fellowship Program (SFFP), the Air Force Research Laboratory (AFRL) Visiting Faculty Research Program (VFRP), the National Science Foundation (NSF) and the National Institute of Health (NIH). All chapters were partially supported by the AFOSR Information Operations and Security Program extramural and intramural funds (AFOSR/RSL Program Manager: Dr. Robert Herklotz). Key Features: * Contains surveys of cyber threats and security issues in cloud computing and presents secure cloud architectures * Presents in-depth cloud auditing techniques, federated cloud security architectures, cloud access control models, and access assured information sharing technologies * Outlines a wide range of challenges and provides solutions to manage and control very large and complex data sets
This book constitutes the refereed post-conference proceedings of the 10th IFIP WG 5.14 International Conference on Computer and Computing Technologies in Agriculture, CCTA 2016, held in Dongying, China, in October 2016. The 55 revised papers presented were carefully reviewed and selected from 128 submissions. They cover a wide range of interesting theories and applications of information technology in agriculture, including intelligent sensing, cloud computing, key technologies of the Internet of Things, precision agriculture, animal husbandry information technology, including Internet + modern animal husbandry, livestock big data platform and cloud computing applications, intelligent breeding equipment, precision production models, water product networking and big data , including fishery IoT, intelligent aquaculture facilities, and big data applications.
This book describes the common ground between electricity markets (EMs) and software agents (or artificial intelligence generally). It presents an up-to-date introduction to EMs and intelligent agents, and offers a comprehensive description of the research advances and key achievements related to existing and emerging market designs to reliably and efficiently manage the potential challenges of variable generation (VG). Most EMs are unique in their complex relationships between economics and the physics of energy, but were created without the notion that large penetrations of variable generation (VG) would be part of the supply mix. An advanced multi-agent approach simulates the behavior of power markets over time, particularly markets with large-scale penetrations of renewable resources. It is intended as a reference book for researchers, academics and industry practitioners, but given the scope of the chapters and the highly accessible style, the book also provides a coherent foundation for several different graduate courses.
This edited book presents scientific results of 15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2014) held on June 30 - July 2, 2014 in Las Vegas Nevada, USA. The aim of this conference was to bring together scientists, engineers, computer users, and students to share their experiences and exchange new ideas, research results about all aspects (theory, applications and tools) of computer and information science, and to discuss the practical challenges encountered along the way and the solutions adopted to solve them. The conference organizers selected the 13 outstanding papers from those papers accepted for presentation at the conference.
Decades of scientific research on neurophysiology have proven emotions are not simply a minor aspect of human activity, but rather a fundamental one. The Handbook of Research on Synthetic Emotions and Sociable Robotics: New Applications in Affective Computing and Artificial Intelligence focuses on the integration of emotions into artificial environments such as computers and robotics. Written by an international collaboration of experts within the field, this Handbook of Research covers topics such as emotion simulation and emotion synthetic development. |
You may like...
Research Handbook on the Law of…
Woodrow Barfield, Ugo Pagallo
Paperback
R1,471
Discovery Miles 14 710
Advanced Introduction to Law and…
Woodrow Barfield, Ugo Pagallo
Paperback
R639
Discovery Miles 6 390
Advanced Introduction to Artificial…
Tom Davenport, John Glaser, …
Paperback
R573
Discovery Miles 5 730
The Handbook on Socially Interactive…
Birgit Lugrin, Catherine Pelachaud, …
Hardcover
R2,386
Discovery Miles 23 860
The Age of AI - And Our Human Future
Henry A. Kissinger, Eric Schmidt, …
Paperback
|