![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > General
“Intelligent Routines II: Solving Linear Algebra and Differential Geometry with Sage” contains numerous of examples and problems as well as many unsolved problems. This book extensively applies the successful software Sage, which can be found free online http://www.sagemath.org/. Sage is a recent and popular software for mathematical computation, available freely and simple to use. This book is useful to all applied scientists in mathematics, statistics and engineering, as well for late undergraduate and graduate students of above subjects. It is the first such book in solving symbolically with Sage problems in Linear Algebra and Differential Geometry. Plenty of SAGE applications are given at each step of the exposition.
In this thesis, the author explains the background of problems in quantum estimation, the necessary conditions required for estimation precision benchmarks that are applicable and meaningful for evaluating data in quantum information experiments, and provides examples of such benchmarks. The author develops mathematical methods in quantum estimation theory and analyzes the benchmarks in tests of Bell-type correlation and quantum tomography with those methods. Above all, a set of explicit formulae for evaluating the estimation precision in quantum tomography with finite data sets is derived, in contrast to the standard quantum estimation theory, which can deal only with infinite samples. This is the first result directly applicable to the evaluation of estimation errors in quantum tomography experiments, allowing experimentalists to guarantee estimation precision and verify quantitatively that their preparation is reliable.
The aim of the book is to give an accessible introduction of mathematical models and signal processing methods in speech and hearing sciences for senior undergraduate and beginning graduate students with basic knowledge of linear algebra, differential equations, numerical analysis, and probability. Speech and hearing sciences are fundamental to numerous technological advances of the digital world in the past decade, from music compression in MP3 to digital hearing aids, from network based voice enabled services to speech interaction with mobile phones. Mathematics and computation are intimately related to these leaps and bounds. On the other hand, speech and hearing are strongly interdisciplinary areas where dissimilar scientific and engineering publications and approaches often coexist and make it difficult for newcomers to enter.
With the advent and increasing popularity of Computer Supported Collaborative Learning (CSCL) and e-learning technologies, the need of automatic assessment and of teacher/tutor support for the two tightly intertwined activities of comprehension of reading materials and of collaboration among peers has grown significantly. In this context, a polyphonic model of discourse derived from Bakhtin’s work as a paradigm is used for analyzing both general texts and CSCL conversations in a unique framework focused on different facets of textual cohesion. As specificity of our analysis, the individual learning perspective is focused on the identification of reading strategies and on providing a multi-dimensional textual complexity model, whereas the collaborative learning dimension is centered on the evaluation of participants’ involvement, as well as on collaboration assessment. Our approach based on advanced Natural Language Processing techniques provides a qualitative estimation of the learning process and enhances understanding as a “mediator of learning” by providing automated feedback to both learners and teachers or tutors. The main benefits are its flexibility, extensibility and nevertheless specificity for covering multiple stages, starting from reading classroom materials, to discussing on specific topics in a collaborative manner and finishing the feedback loop by verbalizing metacognitive thoughts.
This book deals with the growing challenges of using assistive robots in our everyday activities along with providing intelligent assistive services. The presented applications concern mainly healthcare and wellness such as helping elderly people, assisting dependent persons, habitat monitoring in smart environments, well-being, security, etc. These applications reveal also new challenges regarding control theory, mechanical design, mechatronics, portability, acceptability, scalability, security, etc.
The essays in this book look at the question of whether physics can be based on information, or – as John Wheeler phrased it – whether we can get “It from Bit”. They are based on the prize-winning essays submitted to the FQXi essay competition of the same name, which drew over 180 entries. The eighteen contributions address topics as diverse as quantum foundations, entropy conservation, nonlinear logic and countable spacetime. Together they provide stimulating reading for all physics aficionados interested in the possible role(s) of information in the laws of nature. The Foundational Questions Institute, FQXi, catalyzes, supports, and disseminates research on questions at the foundations of physics and cosmology, particularly new frontiers and innovative ideas integral to a deep understanding of reality, but unlikely to be supported by conventional funding sources.
This volume gathers the peer reviewed papers which were presented at the third edition of the International Workshop “Service Orientation in Holonic and Multi-agent Manufacturing and Robotics – SOHOMA’13” organized on June 20-22, 2013 by the Centre of Research in Computer Integrated Manufacturing and Robotics – CIMR Bucharest, and hosted by the University of Valenciennes, France. The book is structured in five parts, each one covering a specific research domain which represents a trend for modern manufacturing control: Distributed Intelligence for Sustainable Manufacturing, Holonic and Multi-Agent Technologies for Manufacturing Planning and Control; Service Orientation in Manufacturing Management and Control, Intelligent Products and Product-driven Automation and Robotics for Manufacturing and Services. These five evolution lines have in common concepts related to service orientation in a distributed planning and control agent-based industrial environment; today it is generally recognized that the Service Oriented Enterprise Architecture paradigm has been looked upon as a suitable and effective approach for industrial automation and management of manufacturing enterprises.
Elucidating the spatial and temporal dynamics of how things connect has become one of the most important areas of research in the 21st century. Network science now pervades nearly every science domain, resulting in new discoveries in a host of dynamic social and natural systems, including: how neurons connect and communicate in the brain, how information percolates within and among social networks, the evolution of science research through co-authorship networks, the spread of epidemics and many other complex phenomena. Over the past decade, advances in computational power have put the tools of network analysis in the hands of increasing numbers of scientists, enabling more explorations of our world than ever before possible. Information science, social sciences, systems biology, ecosystems ecology, neuroscience and physics all benefit from this movement, which combines graph theory with data sciences to develop and validate theories about the world around us. This book brings together cutting-edge research from the network science field and includes diverse and interdisciplinary topics such as: modeling the structure of urban systems, behavior in social networks, education and learning, data network architecture, structure and dynamics of organizations, crime and terrorism, as well as network topology, modularity and community detection.
This book takes a quantitative look at ICT-generated event data to highlight current trends and issues in Nigeria at the local, state and national levels. Without emphasizing a specific policy or agenda, it provides context and perspective on the relative spatial-temporal distribution of conflict factors in Nigeria. The analysis of violence at state and local levels reveals a fractal pattern of overlapping ecosystems of conflict risk that must be understood for effective, conflict-sensitive approaches to development and direct conflict mitigation efforts. Moving beyond analyses that use a broad religious, ethnic or historical lens, this book focuses on the country’s 774 local government areas and incorporates over 10,000 incidents coded by location, date and indicator to identify patterns in conflict risk between 2009 and 2013. It is the first book to track conflict in Nigeria during this period, which covers the Amnesty Agreement in the Niger Delta and the birth of Boko Haram in the North. It also includes conflict risk heat maps of each state and trend-lines of violence. The authors conclude with a discussion of the nuanced factors that lead to escalating violence, such as resource competition and trends in terrorism during this critical point in Nigeria’s history. Violence in Nigeria is designed as a reference for researchers and practitioners working in security, peacebuilding and development, including policy makers, intelligence experts, diplomats, national defense and homeland security experts. Advanced-level students studying public policy, international relations or computer science will also find this book useful as a secondary textbook or reference.
Proceedings of the 2015 Chinese Intelligent Automation Conference presents selected research papers from the CIAC’15, held in Fuzhou, China. The topics include adaptive control, fuzzy control, neural network based control, knowledge based control, hybrid intelligent control, learning control, evolutionary mechanism based control, multi-sensor integration, failure diagnosis, reconfigurable control, etc. Engineers and researchers from academia, industry and the government can gain valuable insights into interdisciplinary solutions in the field of intelligent automation.
The contributions for this book have been gathered over several years from conferences held in the series of Mechatronics and Machine Vision in Practice, the latest of which was held in Ankara, Turkey. The essential aspect is that they concern practical applications rather than the derivation of mere theory, though simulations and visualization are important components. The topics range from mining, with its heavy engineering, to the delicate machining of holes in the human skull or robots for surgery on human flesh. Mobile robots continue to be a hot topic, both from the need for navigation and for the task of stabilization of unmanned aerial vehicles. The swinging of a spray rig is damped, while machine vision is used for the control of heating in an asphalt-laying machine. Manipulators are featured, both for general tasks and in the form of grasping fingers. A robot arm is proposed for adding to the mobility scooter of the elderly. Can EEG signals be a means to control a robot? Can face recognition be achieved in varying illumination?"
The current book is the first publication of a complete overview of machine learning methodologies for the medical and health sector. It was written as a training companion and as a must-read, not only for physicians and students, but also for any one involved in the process and progress of health and health care. In eighty chapters eighty different machine learning methodologies are reviewed, in combination with data examples for self-assessment. Each chapter can be studied without the need to consult other chapters. The amount of data stored in the world's databases doubles every 20 months, and clinicians, familiar with traditional statistical methods, are at a loss to analyze them. Traditional methods have, indeed, difficulty to identify outliers in large datasets, and to find patterns in big data and data with multiple exposure / outcome variables. In addition, analysis-rules for surveys and questionnaires, which are currently common methods of data collection, are, essentially, missing. Fortunately, the new discipline, machine learning, is able to cover all of these limitations. So far medical professionals have been rather reluctant to use machine learning. Also, in the field of diagnosis making, few doctors may want a computer checking them, are interested in collaboration with a computer or with computer engineers. Adequate health and health care will, however, soon be impossible without proper data supervision from modern machine learning methodologies like cluster models, neural networks and other data mining methodologies. Each chapter starts with purposes and scientific questions. Then, step-by-step analyses, using data examples, are given. Finally, a paragraph with conclusion, and references to the corresponding sites of three introductory textbooks, previously written by the same authors, is given.
This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. It is the first book to explore the scientific foundation of cyber warfare and features research from the areas of artificial intelligence, game theory, programming languages, graph theory and more. The high-level approach and emphasis on scientific rigor provides insights on ways to improve cyber warfare defense worldwide. Cyber Warfare: Building the Scientific Foundation targets researchers and practitioners working in cyber security, especially government employees or contractors. Advanced-level students in computer science and electrical engineering with an interest in security will also find this content valuable as a secondary textbook or reference.
This book presents the state-of-the-art techniques and recent research progress on Ear Biometrics. Among the various physiological traits, the reasons for the ear to gain much attention in recent years are many folds. It has been found to be a reliable biometrics for human verification and identification. Ears are remarkably consistent and unlike face, it does not change shape with different expressions or age, and remain fixed in the middle of the side of the head against a predictable background. The book contains figures, tables and plots to illustrate the techniques in an easy and lucid manner. The book also provides an extensive literature on the subject, where readers have the benefit of receiving all the relevant material at one place in a very comprehensive manner. This book caters students, academics, researchers, practitioners who are interested in the field of Ear Biometrics and its applications in face recognition and security.
This carefully edited volume is the outcome of the eleventh edition of the Workshop on Algorithmic Foundations of Robotics (WAFR), which is the premier venue showcasing cutting edge research in algorithmic robotics. The eleventh WAFR, which was held August 3-5, 2014 at Boğaziçi University in Istanbul, Turkey continued this tradition. This volume contains extended versions of the 42 papers presented at WAFR. These contributions highlight the cutting edge research in classical robotics problems (e.g.  manipulation, motion, path, multi-robot and kinodynamic planning), geometric and topological computation in robotics as well novel applications such as informative path planning, active sensing and surgical planning.  This book - rich by topics and authoritative contributors - is a unique reference on the current developments and new directions in the field of algorithmic foundations.
The aim of this book is to understand the state-of-the-art theoretical and practical advances of swarm intelligence. It comprises seven contemporary relevant chapters. In chapter 1, a review of Bacteria Foraging Optimization (BFO) techniques for both single and multiple criterions problem is presented. A survey on swarm intelligence for multiple and many objectives optimization is presented in chapter 2 along with a topical study on EEG signal analysis. Without compromising the extensive simulation study, a comparative study of variants of MOPSO is provided in chapter 3. Intractable problems like subset and job scheduling problems are discussed in chapters 4 and 7 by different hybrid swarm intelligence techniques. An attempt to study image enhancement by ant colony optimization is made in chapter 5. Finally, chapter 7 covers the aspect of uncertainty in data by hybrid PSO.      Â
This book constitutes the refereed post-proceedings of the 4th IFIP WG 9.7 Conference on the History of Nordic Computing, HiNC 4, held in Copenhagen, Denmark, in August 2014. The 37 revised full papers were carefully reviewed and selected for inclusion in this volume. The papers focus on innovative ICT milestones that transformed the nordic societies and on the new ideas, systems and solutions that helped creating the welfare societies of today, in particular solutions and systems for public services, e.g., tax, social benefits, health care and education; solutions and systems for the infrastructure of the society, e.g., banking, insurance, telephones, transport and energy supply; and technologies and IT policies behind the major IT milestones, e.g., user centric innovation, programming techniques and IT ethics. They are organized in topical sections on IT policy, infrastructure, public services, private services, telesystems, health care, IT in banking, transport and IT technology.
This book provides research findings and practical information on online communication strategies in politics. Based on communication research and real-world political-campaign experience, the author examines how to use the Web and social media to create public visibility, build trust and consensus and boost political participation. It offers a useful guide for practitioners working in the political arena, as well as for those managing communication projects in institutions or companies.
This is the first book to present field studies on the application of subject-oriented business process management (S-BPM). Each case presents a specific story and focuses on an essential modeling or implementation issue, and most end with implications or suggestions for further studies. Significant variables and success factors are identified that were discovered during the respective study and lead to suggesting S-BPM novelties. For each case, the authors explain step-by-step how the story develops, and provide readers guidance by detailing the respective rationale. The studies covered are clustered according to three main S-BPM themes: Part I “Business Operation Support” documents approaches to the practical development of S-BPM solutions in various application domains and organizational settings, while Part II “Consultancy and Education Support” highlights cases that can help to train readers in S-BPM modeling and knowledge acquisition for S-BPM lifecycle iterations. It also refers to architecting S-BPM solutions for application cases based on hands-on experience. Part III “Technical Execution Support” focuses on concepts for utilizing specific theories and technologies to execute S-BPM models. It also addresses how to create reference models for certain settings in the field. Lastly, the appendix covers all relevant aspects needed to grasp S-BPM modeling and apply it based on fundamental examples. Its format reconciles semantic precision with syntactic rigor.>Addressing the needs of developers, educators and practitioners, this book will help companies to learn from the experiences of first-time users and to develop systems that fit their business processes, explaining the latest key methodological and technological S-BPM developments in the fields of training, research and application.
This book presents an Intelligent Control Architecture (ICA) to enable multiple collaborating marine vehicles to autonomously carry out underwater intervention missions. The presented ICA is generic in nature but aimed at a case study where a marine surface craft and an underwater vehicle are required to work cooperatively. It is shown that they are capable of cooperating autonomously towards the execution of complex activities since they have different but complementary capabilities. The ICA implementation is verified in simulation, and validated in trials by means of a team of autonomous marine robots. This book also presents architectural details and evaluation scenarios of the ICA, results of simulations and trials from different maritime operations, and future research directions.
This book focuses on civil and structural engineering and construction management applications. The contributions constitute modified, extended and improved versions of research presented at the minisymposium organized by the editors at the ECCOMAS conference on this topic in Barcelona 2014.
“Propagation, which looks at spreading in complex networks, can be seen from many viewpoints; it is undesirable, or desirable, controllable, the mechanisms generating that propagation can be the topic of interest, but in the end all depends on the setting. This book covers leading research on a wide spectrum of propagation phenomenon and the techniques currently used in its modelling, prediction, analysis and control. Fourteen papers range over topics including epidemic models, models for trust inference, coverage strategies for networks, vehicle flow propagation, bio-inspired routing algorithms, P2P botnet attacks and defences, fault propagation in gene-cellular networks, malware propagation for mobile networks, information propagation in crisis situations, financial contagion in interbank networks, and finally how to maximize the spread of influence in social networks. The compendium will be of interest to researchers, those working in social networking, communications and finance and is aimed at providing a base point for further studies on current research. Above all, by bringing together research from such diverse fields, the book seeks to cross-pollinate ideas, and give the reader a glimpse of the breath of current research.”
This book presents a comprehensive report on the evolution of Fuzzy Logic since its formulation in Lotfi Zadeh’s seminal paper on “fuzzy sets,” published in 1965. In addition, it features a stimulating sampling from the broad field of research and development inspired by Zadeh’s paper. The chapters, written by pioneers and prominent scholars in the field, show how fuzzy sets have been successfully applied to artificial intelligence, control theory, inference, and reasoning. The book also reports on theoretical issues; features recent applications of Fuzzy Logic in the fields of neural networks, clustering, data mining and software testing; and highlights an important paradigm shift caused by Fuzzy Logic in the area of uncertainty management. Conceived by the editors as an academic celebration of the fifty years’ anniversary of the 1965 paper, this work is a must-have for students and researchers willing to get an inspiring picture of the potentialities, limitations, achievements and accomplishments of Fuzzy Logic-based systems.
The contributions in this volume focus on the Bayesian interpretation of natural languages, which is widely used in areas of artificial intelligence, cognitive science, and computational linguistics. This is the first volume to take up topics in Bayesian Natural Language Interpretation and make proposals based on information theory, probability theory, and related fields. The methodologies offered here extend to the target semantic and pragmatic analyses of computational natural language interpretation. Bayesian approaches to natural language semantics and pragmatics are based on methods from signal processing and the causal Bayesian models pioneered by especially Pearl. In signal processing, the Bayesian method finds the most probable interpretation by finding the one that maximizes the product of the prior probability and the likelihood of the interpretation. It thus stresses the importance of a production model for interpretation as in Grice’s contributions to pragmatics or in interpretation by abduction.
Recent years have seen the development of two significant trends namely: the adoption of some Traditional Chinese Medicine Practices into mainstream Allopathic Western Medicine and the advent of the internet and broad band networks leading to an increased interest in the use of Telemedicine to deliver medical services. In this book, we see the convergence of these two trends leading to a semantically-based TCM Telemedicine system that utilizes an ontology to provide sharable knowledge in the TCM realm to achieve this. The underpinning research required the development of a three-layer architecture and an Ontology of the TCM knowledge. As TCM knowledge like all medical knowledge is not frozen in time it was important to develop an approach that would allow evolution of the Ontology when new evidence became available. In order for the system to be practically grounded it was important to work with an industry partner PuraPharm Group/HerbMiners Informatics Limited. This partnership was initiated through Professor Allan Wong and the Chairman of PuraPharm Group Mr. Abraham Chan. This led to the system being utilized in more than 20 Mobile Clinics in Hong Kong and 300 Hospitals in China. In order for these different deployments of the system to be coherent with the main core Ontology, it was necessary for us to develop an Ontology Driven Software System Generation approach. |
![]() ![]() You may like...
CompTIA A+ Guide to Information…
Nicholas Pierce, Jean Andrews, …
Hardcover
Principles Of Business Information…
Ralph Stair, George Reynolds, …
Paperback
![]()
|