![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Applications of computing > Artificial intelligence > Knowledge-based systems / expert systems
The volume LNAI 13546 constitutes the refereed proceedings of the 23rd Annual Conference Towards Autonomous Robotic Systems, TAROS 2022, held in Culham, UK, in September 2022. The 14 full papers and 10 short papers were carefully reviewed and selected from 38 submissions. Organized in the topical sections "Algorithms" and "Systems", they discuss significant findings and advances in the following areas: Robotic Grippers and Manipulation; Soft Robotics, Sensing and Mobile Robots; Robotic Learning, Mapping and Planning; Robotic Systems and Applications.
This volume constitutes the refereed proceedings of the Second International Conference on Geo-Informatics in Resource Management and Sustainable Ecosystem, GRMSE 2014, held in Ypsilanti, MI, China, in December 2014. The 73 papers presented were carefully reviewed and selected from 296 submissions. The papers are divided into topical sections on smart city in resource management and sustainable ecosystem; spatial data acquisition through RS and GIS in resource management and sustainable ecosystem; ecological and environmental data processing and management; advanced geospatial model and analysis for understanding ecological and environmental process; applications of geo-informatics in resource management and sustainable ecosystem.
This book sonstitutes selected papers from the first International Conference on Cyber Warfare, Security and Space Research, SpacSec 2021, held in Jaipur, India, in December 2021. The 19 full and 6 short papers were thoroughly reviewed and selected from the 98 submissions. The papers present research on cyber warfare, cyber security, and space research area, including the understanding of threats and risks to systems, the development of a strong innovative culture, and incident detection and post-incident investigation.
This book constitutes the refereed proceedings of the 19th International Conference on Virtual Reality and Mixed Reality, EuroXR 2022, held in Stuttgart, Germany, in September 2022.The 6 full and 2 short papers were carefully reviewed and selected from 37 submissions. The conference presents contributions on results and insights in Virtual Reality (VR), Augmented Reality (AR), and Mixed Reality (MR), commonly referred to under the umbrella of Extended Reality (XR), including software systems, immersive rendering technologies, 3D user interfaces, and applications.
Embedded systems have long become essential in application areas in which human control is impossible or infeasible. The development of modern embedded systems is becoming increasingly difficult and challenging because of their overall system complexity, their tighter and cross-functional integration, the increasing requirements concerning safety and real-time behavior, and the need to reduce development and operation costs. This book provides a comprehensive overview of the Software Platform Embedded Systems (SPES) modeling framework and demonstrates its applicability in embedded system development in various industry domains such as automation, automotive, avionics, energy, and healthcare. In SPES 2020, twenty-one partners from academia and industry have joined forces in order to develop and evaluate in different industrial domains a modeling framework that reflects the current state of the art in embedded systems engineering. The content of this book is structured in four parts. Part I "Starting Point" discusses the status quo of embedded systems development and model-based engineering, and summarizes the key requirements faced when developing embedded systems in different application domains. Part II "The SPES Modeling Framework" describes the SPES modeling framework. Part III "Application and Evaluation of the SPES Modeling Framework" reports on the validation steps taken to ensure that the framework met the requirements discussed in Part I. Finally, Part IV "Impact of the SPES Modeling Framework" summarizes the results achieved and provides an outlook on future work. The book is mainly aimed at professionals and practitioners who deal with the development of embedded systems on a daily basis. Researchers in academia and industry may use it as a compendium for the requirements and state-of-the-art solution concepts for embedded systems development.
This book constitutes the refereed proceedings of the 6th International Conference, ICISP 2014, held in June/July 2014 in Cherbourg, France. The 76 revised full papers were carefully reviewed and selected from 164 submissions. The contributions are organized in topical sections on multispectral colour science, color imaging and applications, digital cultural heritage, document image analysis, graph-based representations, image filtering and representation, computer vision and pattern recognition, computer graphics, biomedical, and signal processing.
This book constitutes the refereed proceedings of the 19th Ada-Europe International Conference on Reliable Software Technologies, Ada-Europe 2014, held in Paris, France, in June 2014. The revised 12 full papers presented together with two keynotes were carefully reviewed and selected from 68 submissions. They are organized in topical sections on formal methods; uses of ada; real-time scheduling; applications.
This book constitutes the proceedings of the 6th International Workshop on Communication Technologies for Vehicles, Nets4Cars/Nets4Trains/Nets4Aircraft 2014, held in Offenburg, Germany in May 2014. The 10 papers presented in this volume were carefully reviewed and selected from 15 submissions. The book also contains 4 invited papers. The contributions are organized in topical sections named: automotive issues, car-to-car, aviation issues, in-car, and infrastructures.
Data Intensive Computing refers to capturing, managing, analyzing, and understanding data at volumes and rates that push the frontiers of current technologies. The challenge of data intensive computing is to provide the hardware architectures and related software systems and techniques which are capable of transforming ultra-large data into valuable knowledge. "Handbook of Data Intensive Computing" is written by leading international experts in the field. Experts from academia, research laboratories and private industry address both theory and application. Data intensive computing demands a fundamentally different set of principles than mainstream computing. Data-intensive applications typically are well suited for large-scale parallelism over the data and also require an extremely high degree of fault-tolerance, reliability, and availability. Real-world examples are provided throughout the book. "Handbook of Data Intensive Computing" is designed as a reference for practitioners and researchers, including programmers, computer and system infrastructure designers, and developers. This book can also be beneficial for business managers, entrepreneurs, and investors.
This book constitutes the refereed proceedings of the 11th
European Conference on Wireless Sensor Networks, EWSN 2014, held in
Oxford, UK, in February 2014.
This book constitutes the thoroughly refereed conference proceedings of the 18th International Workshop on Formal Methods for Industrial Critical Systems, FMICS 2013, held in Madrid, Spain, in September 2013. The 13 papers presented were carefully selected from 25 submissions and cover topics such as design, specification, code generation and testing based on formal methods, methods, techniques and tools to support automated analysis, certification, debugging, learning, optimization and transformation of complex, distributed, dependable, real-time systems and embedded systems, verification and validation methods, tools for the development of formal design descriptions, case studies and experience reports on industrial applications of formal methods, impact of the adoption of formal methods on the development process and associated costs, application of formal methods in standardization and industrial forums.
This book constitutes the refereed proceedings of the 10th International Conference on Smart Homes and Health Telematics, ICOST 2012, held in Artiminio, Tuscany, Italy, June 12- 15, 2012. The 25 revised full papers presented together with 22 short papers were carefully reviewed and selected from 74 submissions. The papers are categorized into a number of sessions that include: User Engagement for Improved Adoption of Assistive Technologies, Self-Management and Tele-Rehabilitation, Advances in Remote Monitoring and Activity Recognition, Sensor Networks for Unobstrusive Monitoring Solutions, and Real World "Aware" Systems.
This book constitutes the thoroughly refereed proceedings of the 25th International Conference on Computer Aided Verification, CAV 2013 held in St. Petersburg, Russia in July 2013. The 54 regular and 16 tool papers presented were carefully selected from 209 submissions. The papers are organized in topical sections on biology, concurrency, hardware, hybrid systems, interpolation, loops and termination, new domains, probability and statistics, SAT and SMZ, security, shape analysis, synthesis, and time.
This book constitutes the refereed proceedings of the 11th International Conference on Smart Homes and Health Telematics, ICOST 2013, held in Singapore, in June 2013. The 22 revised full papers presented together with one invited paper and 19 short papers were carefully reviewed and selected from 53 submissions. The papers are organized in topical sections on Supportive Technology for Ageing and People with Cognitive Impairment; Activity Recognition and Algorithmic Techniques; Trust, Security and Social Issues; Assistive Robotics and HCI Issues; Supporting Safety and Pervasive Healthcare; Home Energy Usage, Reasoning Framework, Services; Algorithms for Smart Homes; Eldercare - Activity Recognition and Fall Detection; Healthcare and Rehabilitation; Robotics and Assistive Living.
This book constitutes the refereed proceedings of the 18th Ada-Europe International Conference on Reliable Software Technologies, Ada-Europe 2013, was held in Berlin, Germany, in June 2013. The 11 full papers presented were carefully reviewed and selected from various submissions. They are organized in topical sections on multi-core and distributed systems; Ada and Spark; dependability; and real-time systems.
This book constitutes the joint refereed proceedings of the 5th International Workshop on Communication Technologies for Vehicles/Trains, Nets4Cars 2013 and Nets4Trains 2013, held in Vilnius, Lithuania, in May 2013. The 12 full papers of the road track and 5 full papers of the rail track presented together with 3 invited talks were carefully reviewed and selected from 24 submissions. They address topics such as intra-vehicle, inter-vehicle and vehicle to infrastructure communications (protocols and standards), mobility and traffic models (models, methodologies, and techniques), testing, and applications.
This book constitutes the thoroughly refereed post-conference proceedings of the Third International Joint Conference on Knowledge Discovery, Knowledge Engineering, and Knowledge Management, IC3K 2011, held in Paris, France, in October 2011. This book includes revised and extended versions of a strict selection of the best papers presented at the conference; 39 revised full papers together with one invited lecture were carefully reviewed and selected from 429 submissions. According to the three covered conferences KDIR 2011, KEOD 2011, and KMIS 2011, the papers are organized in topical sections on knowledge discovery and information retrieval, knowledge engineering and ontology development, and on knowledge management and information sharing.
Design for large-scale, high-performance queries using Snowflake's query processing engine to empower data consumers with timely, comprehensive, and secure access to data. This book also helps you protect your most valuable data assets using built-in security features such as end-to-end encryption for data at rest and in transit. It demonstrates key features in Snowflake and shows how to exploit those features to deliver a personalized experience to your customers. It also shows how to ingest the high volumes of both structured and unstructured data that are needed for game-changing business intelligence analysis. Mastering Snowflake Solutions starts with a refresher on Snowflake's unique architecture before getting into the advanced concepts that make Snowflake the market-leading product it is today. Progressing through each chapter, you will learn how to leverage storage, query processing, cloning, data sharing, and continuous data protection features. This approach allows for greater operational agility in responding to the needs of modern enterprises, for example in supporting agile development techniques via database cloning. The practical examples and in-depth background on theory in this book help you unleash the power of Snowflake in building a high-performance system with little to no administrative overhead. Your result from reading will be a deep understanding of Snowflake that enables taking full advantage of Snowflake's architecture to deliver value analytics insight to your business. What You Will Learn Optimize performance and costs associated with your use of the Snowflake data platform Enable data security to help in complying with consumer privacy regulations such as CCPA and GDPR Share data securely both inside your organization and with external partners Gain visibility to each interaction with your customers using continuous data feeds from Snowpipe Break down data silos to gain complete visibility your business-critical processes Transform customer experience and product quality through real-time analytics Who This Book Is for Data engineers, scientists, and architects who have had some exposure to the Snowflake data platform or bring some experience from working with another relational database. This book is for those beginning to struggle with new challenges as their Snowflake environment begins to mature, becoming more complex with ever increasing amounts of data, users, and requirements. New problems require a new approach and this book aims to arm you with the practical knowledge required to take advantage of Snowflake's unique architecture to get the results you need.
This book constitutes the thoroughly refereed post-conference proceedings of the Second International Joint Conference on Knowledge Discovery, Knowledge Engineering, and Knowledge Management, IC3K 2010, held in Valencia, Spain, in October 2010. This book includes revised and extended versions of a strict selection of the best papers presented at the conference; 26 revised full papers together with 2 invited lectures were carefully reviewed and selected from 369 submissions. According to the three covered conferences KDIR 2010, KEOD 2010, and KMIS 2010, the papers are organized in topical sections on knowledge discovery and information retrieval, knowledge engineering and ontology development, and on knowledge management and information sharing.
With the proliferation of GPS devices in daily life, trajectory data that records where and when people move is now readily available on a large scale. As one of the most typical representatives, it has now become widely recognized that taxi trajectory data provides rich opportunities to enable promising smart urban services. Yet, a considerable gap still exists between the raw data available, and the extraction of actionable intelligence. This gap poses fundamental challenges on how we can achieve such intelligence. These challenges include inaccuracy issues, large data volumes to process, and sparse GPS data, to name but a few. Moreover, the movements of taxis and the leaving trajectory data are the result of a complex interplay between several parties, including drivers, passengers, travellers, urban planners, etc. In this book, we present our latest findings on mining taxi GPS trajectory data to enable a number of smart urban services, and to bring us one step closer to the vision of smart mobility. Firstly, we focus on some fundamental issues in trajectory data mining and analytics, including data map-matching, data compression, and data protection. Secondly, driven by the real needs and the most common concerns of each party involved, we formulate each problem mathematically and propose novel data mining or machine learning methods to solve it. Extensive evaluations with real-world datasets are also provided, to demonstrate the effectiveness and efficiency of using trajectory data. Unlike other books, which deal with people and goods transportation separately, this book also extends smart urban services to goods transportation by introducing the idea of crowdshipping, i.e., recruiting taxis to make package deliveries on the basis of real-time information. Since people and goods are two essential components of smart cities, we feel this extension is bot logical and essential. Lastly, we discuss the most important scientific problems and open issues in mining GPS trajectory data.
This book constitutes the refereed proceedings of the international competition aimed at the evaluation and assessment of Ambient Assisted Living, EvAAL 2013, which was organized in three major events: the International Competition on Indoor Localization and Tracking for Ambient Assisted Living, which took place in Madrid, Spain, in July 2013; the International Competition on Activity Recognition for Ambient Assisted Living, which took place in Valencia, Spain, in July 2013; and the Final Workshop, which was held in Norrkoping, Sweden, in September 2013. The papers included in this book describe the organization and technical aspects of the competitions and provide a complete technical description of the competing artefacts and report on the experience lessons learned by the teams during the competition."
Without correct timing, there is no safe and reliable embedded software. This book shows how to consider timing early in the development process for embedded systems, how to solve acute timing problems, how to perform timing optimization, and how to address the aspect of timing verification.The book is organized in twelve chapters. The first three cover various basics of microprocessor technologies and the operating systems used therein. The next four chapters cover timing problems both in theory and practice, covering also various timing analysis techniques as well as special issues like multi- and many-core timing. Chapter 8 deals with aspects of timing optimization, followed by chapter 9 that highlights various methodological issues of the actual development process. Chapter 10 presents timing analysis in AUTOSAR in detail, while chapter 11 focuses on safety aspects and timing verification. Finally, chapter 12 provides an outlook on upcoming and future developments in software timing. The number of embedded systems that we encounter in everyday life is growing steadily. At the same time, the complexity of the software is constantly increasing. This book is mainly written for software developers and project leaders in industry. It is enriched by many practical examples mostly from the automotive domain, yet the vast majority of the book is relevant for any embedded software project. This way it is also well-suited as a textbook for academic courses with a strong practical emphasis, e.g. at applied sciences universities. Features and Benefits * Shows how to consider timing in the development process for embedded systems, how to solve timing problems, and how to address timing verification * Enriched by many practical examples mostly from the automotive domain * Mainly written for software developers and project leaders in industry
This book introduces the Internet access for vehicles as well as novel communication and computing paradigms based on the Internet of vehicles. To enable efficient and reliable Internet connection for mobile vehicle users, this book first introduces analytical modelling methods for the practical vehicle-to-roadside (V2R) Internet access procedure, and employ the interworking of V2R and vehicle-to-vehicle (V2V) to improve the network performance for a variety of automotive applications. In addition, the wireless link performance between a vehicle and an Internet access station is investigated, and a machine learning based algorithm is proposed to improve the link throughout by selecting an efficient modulation and coding scheme. This book also investigates the distributed machine learning algorithms over the Internet access of vehicles. A novel broadcasting scheme is designed to intelligently adjust the training users that are involved in the iteration rounds for an asynchronous federated learning scheme, which is shown to greatly improve the training efficiency. This book conducts the fully asynchronous machine learning evaluations among vehicle users that can utilize the opportunistic V2R communication to train machine learning models. Researchers and advanced-level students who focus on vehicular networks, industrial entities for internet of vehicles providers, government agencies target on transportation system and road management will find this book useful as reference. Network device manufacturers and network operators will also want to purchase this book.
Focus on issues and principles in context awareness, sensor processing and software design (rather than sensor networks or HCI or particular commercial systems). Designed as a textbook, with readings and lab problems in most chapters. Focus on concepts, algorithms and ideas rather than particular technologies.
The 2008 TUB-SJTU joint workshop on Autonomous Systems Self-Organization, Management, and Control was held on October 6, 2008 at Shanghai Jiao Tong University, Shanghai, China. The workshop, sponsored by Shanghai Jiao Tong University and Technical University of Berlin brought together scientists and researchers from both universities to present and discuss the latest progress on autonomous systems and its applications in diverse areas. Autonomous systems are designed to integrate machines, computing, sensing, and software to create intelligent systems capable of interacting with the complexities of the real world. Autonomous systems represent the physical embodiment of machine intelligence. Topics of interest include, but are not limited to theory and modeling for autonomous systems; organization of autonomous systems; learning and perception; complex systems; multi-agent systems; robotics and control; applications of autonomous systems. |
You may like...
Blockchain Technology for Emerging…
S. K. Hafizul Islam, Arup Kumar Pal, …
Paperback
R2,941
Discovery Miles 29 410
5G IoT and Edge Computing for Smart…
Akash Kumar Bhoi, Victor Hugo Costa de Albuquerque, …
Paperback
R2,588
Discovery Miles 25 880
Exploring Future Opportunities of…
Madhulika Bhatia, Tanupriya Choudhury, …
Hardcover
R6,683
Discovery Miles 66 830
Recent Trends in Computational…
Siddhartha Bhattacharyya, Paramartha Dutta, …
Paperback
R3,483
Discovery Miles 34 830
Artificial Intelligence and Data Science…
Mohsen Asadnia, Amir Razmjou, …
Paperback
R2,578
Discovery Miles 25 780
Machine Learning, Big Data, and IoT for…
Pardeep Kumar, Yugal Kumar, …
Paperback
R2,657
Discovery Miles 26 570
|