![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Applications of computing > Artificial intelligence > Knowledge-based systems / expert systems
Biometrics refers to methods for uniquely recognising humans based upon one or more intrinsic physical or behavioural traits. In information technology in particular, biometrics is used as a form of identity access management and access control. It is also used to identify individuals in groups that are under surveillance. Biometric characteristics can be divided in two main classes: physiological and behavioural. Physiological examples include fingerprints, face recognition, DNA, hand and palm geometry, iris recognition, which has largely replaced retina, and odour/scent. Behavioural examples include typing rhythm, gait, and voice. This book gathers the latest research in the field of biometrics and focuses on topics such as on-line signature verification, improving the performance of colour spaces in face recognition, block coding schemes designed for biometrical authentication, large scale palm print identification and distributional properties of count outcomes and limitations of relying on more traditional analytic methods to analyse low base rate occurrences.
The addiction is a brain disease with severe medical consequences. Today, all people in the world are exposed to and use a variety of drugs of abuse. The most harmful of them are nicotine, alcohol, heroin, cocaine and 3,4-methylenedioxymethamphetamine (i.e., Ecstasy, or MDMA). If the 60's were the epoch of psychedelic 'culture', the 70's of the epidemic use of heroin, the 80's of the diffusion of human immunodeficiency (HIV) virus infection between drug addicts, the 90's of the popular use of the club drugs and cocaine, the new millennium is characterised by the trend of using several different drugs of abuse concurrently. In the last years the phenomenon of poly-drug use has been prevalent and it is expected to continue. Several concerns are strictly associated with the poly-drug use. The first is represented by the limits of the treatment strategies today available, the second by the various synergistic and interactive effects on the body of the different drugs of abuse (it is well know the harmful and toxic effects of the combined use of alcohol and cocaine), and the third by the serious medical and psychiatric consequences. This book presents a thoughtful plan for treatment of the substance abuse disorders in the addicted populations, and management of the co-morbid infectious diseases in this patient group.
Embedded systems have long become essential in application areas in which human control is impossible or infeasible. The development of modern embedded systems is becoming increasingly difficult and challenging because of their overall system complexity, their tighter and cross-functional integration, the increasing requirements concerning safety and real-time behavior, and the need to reduce development and operation costs. This book provides a comprehensive overview of the Software Platform Embedded Systems (SPES) modeling framework and demonstrates its applicability in embedded system development in various industry domains such as automation, automotive, avionics, energy, and healthcare. In SPES 2020, twenty-one partners from academia and industry have joined forces in order to develop and evaluate in different industrial domains a modeling framework that reflects the current state of the art in embedded systems engineering. The content of this book is structured in four parts. Part I "Starting Point" discusses the status quo of embedded systems development and model-based engineering, and summarizes the key requirements faced when developing embedded systems in different application domains. Part II "The SPES Modeling Framework" describes the SPES modeling framework. Part III "Application and Evaluation of the SPES Modeling Framework" reports on the validation steps taken to ensure that the framework met the requirements discussed in Part I. Finally, Part IV "Impact of the SPES Modeling Framework" summarizes the results achieved and provides an outlook on future work. The book is mainly aimed at professionals and practitioners who deal with the development of embedded systems on a daily basis. Researchers in academia and industry may use it as a compendium for the requirements and state-of-the-art solution concepts for embedded systems development.
This book constitutes the refereed proceedings of the international competition aimed at the evaluation and assessment of Ambient Assisted Living, EvAAL 2012, which was organized in three major events: the Second International Competition on Indoor Localization and Tracking for Ambient Assisted Living, which took place in Madrid, Spain, in July 2012, the First International Competition on Activity Recognition for Ambient Assisted Living, which took place in Valencia, Spain, in July 2012, and the Final Workshop, which was held in Eindhoven, The Netherlands, in September 2012. The papers included in this book describe the organization and technical aspects of the competitions, and provide a complete technical description of the competing artefacts and report on the experience lessons learned by the teams during the competition.
The author shows how using computers and FORTRAN 95 it is possible to tackle and solve a wide range of problems as they might be encountered in engineering or in the physical sciences.
Human attention is in the highest demand it has ever been. The drastic increase in available information has compelled individuals to find a way to sift through the media that is literally at their fingertips. Content recommendation systems have emerged as the technological solution to this social and informational problem, but they've also created a bigger crisis in confirming our biases by showing us only, and exactly, what it predicts we want to see. Data versus Democracy investigates and explores how, in the era of social media, human cognition, algorithmic recommendation systems, and human psychology are all working together to reinforce (and exaggerate) human bias. The dangerous confluence of these factors is driving media narratives, influencing opinions, and possibly changing election results. In this book, algorithmic recommendations, clickbait, familiarity bias, propaganda, and other pivotal concepts are analyzed and then expanded upon via fascinating and timely case studies: the 2016 US presidential election, Ferguson, GamerGate, international political movements, and more events that come to affect every one of us. What are the implications of how we engage with information in the digital age? Data versus Democracy explores this topic and an abundance of related crucial questions. We live in a culture vastly different from any that has come before. In a society where engagement is currency, we are the product. Understanding the value of our attention, how organizations operate based on this concept, and how engagement can be used against our best interests is essential in responsibly equipping ourselves against the perils of disinformation. Who This Book Is For Individuals who are curious about how social media algorithms work and how they can be manipulated to influence culture. Social media managers, data scientists, data administrators, and educators will find this book particularly relevant to their work.
The Halden Man-Machine Laboratory (HAMMLAB) has been at the heart of human factors research at the OECD Halden Reactor Project (HRP). The HRP is sponsored by a group of national organizations, representing nuclear power plant regulators, utilities, and research institutions. The HRP is hosted by the Institute for Energy Technology (IFE) in Halden, Norway. HAMMLAB comprises three full-scale nuclear power plant control room research simulators. The simulator studies performed in HAMMLAB have traditionally been experimental in nature. In a simulator it is possible to study events as they unfold in real time, in a highly realistic operational environment under partially controlled conditions. This means that a wide range of human factors issues, which would be impossible or highly impracticable to study in real-life settings, can thus be addressed in HAMMLAB. Simulator-based Human Factors Studies Across 25 Years celebrates the twenty-fifth anniversary of HAMMLAB by reviewing the human factors studies performed in HAMMLAB across this time-span. A range of human factors issues have been addressed, including: * human-system interfaces; * alarm systems; * computerized procedures; * human-automation interaction; * staffing, teamwork and human reliability. The aim of HAMMLAB studies has always been the same: to generate knowledge for solving current and future challenges in nuclear power plant operation to contribute to safety. The outcomes of HAMMLAB studies have been used to support design and assessment of nuclear power plant control rooms.
Artificial Intelligence and Industry 4.0 explores recent advancements in blockchain technology and artificial intelligence (AI) as well as their crucial impacts on realizing Industry 4.0 goals. The book explores AI applications in industry including Internet of Things (IoT) and Industrial Internet of Things (IIoT) technology. Chapters explore how AI (machine learning, smart cities, healthcare, Society 5.0, etc.) have numerous potential applications in the Industry 4.0 era. This book is a useful resource for researchers and graduate students in computer science researching and developing AI and the IIoT.
As security technology (ST) becomes specialized and fragmented, it is easy to lose sight that many topics in ST have common threads and because of this, advances in one sub-discipline may transmit to another. The presentation of results between d- ferent sub-disciplines of ST encourages this interchange for the advancement of ST as a whole. Of particular interest is the hybrid approach of combining ideas from one discipline with those of another to achieve a result that is more significant than the sum of the individual parts. Through this hybrid philosophy, a new or common pr- ciple can be discovered which has the propensity to propagate throughout this mul- faceted discipline. This volume comprises the selection of extended versions of papers that were p- sented in their shortened form at the 2008 International Conference on Security Te- nology (http: //www.sersc.org/SECTECH2008/) and 2009 Advanced Science and Te- nology (http: //www.sersc.org/AST2009/). We would like to acknowledge the great effort of all in the SecTech 2008 and AST 2009 International Advisory Board and members of the International Program Committee, as well as all the organizations and individuals who supported the idea of publishing these advances in security technology, including SERSC (http: //www.sersc.org/) and Springer. We would like to give special thanks to Rosslin John Robles, Maricel O. Balitanas, Farkhod Alisherov Alisherovish, Feruza Sattarova Yusfovna. These graduate school students of Hannam University attended to the editing process of this volume with great passi
Computer-based systems have become omnipresent commodities within our - vironment. While for a large variety of these systems such as transportation systems, nuclear or chemical plants, or medical systems their relation to safety is obvious, we often do not re?ect that others are as directly related to risks concerning harm done to persons or matter as, for example, elevator control or mobile phones. At least we are not aware of the risk in our daily use of them. Safecomp as a community and a conference series has accompanied this - velopment for 30 years up to Safecomp 2009, which was the 28th of the series. During this time the topics and methods as well as the community have und- gone changes. These changes re?ect the requirements of the above-mentioned ubiquitious presence of safety-related systems. Safecomp has always encouraged and will further encourage academia and industry to share and exchange their ideas and experiences. After 30 years, we as the organizers of Safecomp 2009, found it imperative to take stock: which methods found their way into the application areas; which new approaches need to be checked for their practical applicability. As di?erent application domains developed their own approaches over the previous decades, we tried to attract people with di?erent backgrounds for this conference. - though the years 2008 and 2009 were not easy with regard to the overall global economic situation, we succeeded with this goal.
It isour greatpleasureto welcomeyouto the SecondInternationalWorkshopon Future Multimedia Networking (FMN). Following the ?rst successful workshop (held in Cardi?, Wales) in 2008, this year's workshop continues the tradition of being a premier forum that gives researchers and practitioners a unique - portunity to share their experiences and discuss state-of-the-art research results and major recent accomplishments in the area of multimedia networking. In recent years, real-time multimedia services have contributed extensively to our life experience and are expected to be among the most important applications in the future Internet. The management of content distribution services and the e?cient deliveryof real-timemultimedia servicesoverdiverseand heterogeneous wired and wireless systems remain a signi?cant challenge for future multimedia networking systems. This year's workshop focused on various aspects of mul- media systems, content networking, and autonomous communication. A speci?c emphasis was placed on upcoming autonomic content networks and technologies that contribute to their development. The call for papers attracted 64 submissions from 32 countries for the main workshop. The Program Committee accepted 16 papers (an acceptance rate of 25%) that cover a range of topics, including wireless and ad-hoc networks in autonomic content networking, streaming and voice services, group and mul- party services, and quality in video and Internet services. This year we also had a Demonstration Session on Future Multimedia Networking for which 12 papers wereacceptedoutofsubmissionsreceivedfromover15countries. Itisoursincere hope that the proceedings of this workshop will serve as a valuable reference for multimedia researchers and developers.
The First International ICST Conference on Communications Infrastructure, Systems and Applications in Europe (EuropeComm 2009) was held August 11-13, 2009, in London. EuropeComm 2009 brought together decision makers from the EU comm- sion, top researchers and industry executives to discuss the directions of communi- tions research and development in Europe. The event also attracted academia and industry representatives, as well as government officials to discuss the current dev- opments and future trends in technology, applications and services in the communi- tions field. Organizing this conference was motivated by the fact that the development and - ployment of future services will require a common global-scale infrastructure, and therefore it is important that designers and stakeholders from all the systems stacks come together to discuss these developments. Rapidly decreasing costs of compu- tional power, storage capacity, and communication bandwidth have led to the dev- opment of a multitude of applications carrying an increasingly huge amount of traffic on the global networking infrastructure. What we have seen is an evolution: an inf- structure looking for networked applications has evolved into an infrastructure str- gling to meet the social, technological and business challenges posed by the plethora of bandwidth-hungry emerging applications.
Edge-of-Things in Personalized Healthcare Support Systems discusses and explores state-of-the-art technology developments in storage and sharing of personal healthcare records in a secure manner that is globally distributed to incorporate best healthcare practices. The book presents research into the identification of specialization and expertise among healthcare professionals, the sharing of records over the cloud, access controls and rights of shared documents, document privacy, as well as edge computing techniques which help to identify causes and develop treatments for human disease. The book aims to advance personal healthcare, medical diagnosis, and treatment by applying IoT, cloud, and edge computing technologies in association with effective data analytics.
The 8th International Conference on Principles of Distributed Systems (OPODIS 2004) was held during December 15-17, 2004 at Grenoble, France. It continued a tradition of successful conferences with friendly and pleasant - mospheres. The earlier organizationsof OPODIS were held in Luzarches(1997), Amiens (1998), Hanoi (1999), Paris (2000), Mexico (2001), Reims (2002) and La Martinique (2003). OPODIS is an open forum for exchange of state-of-the-art knowledge on distributed computing and systems among researchers from around the world. Followingthetraditionofthepreviousorganizations,the2004programwasc- posed of high-quality contributed and invited papers by experts of international caliberinthisscienti?carea. Thetopics ofinterestwerethetheory,speci?cation, design and implementation of distributed systems, which include: - peer-to-peer systems, cluster and grid-based computing - fault tolerance and self-stabilizing systems -real-timeandembeddedsystems - coordination and consistency protocols - distributed and multiprocessor algorithms - communication and synchronization protocols - self-stabilization, reliability and fault tolerance - performance analysis of distributed algorithms and systems - speci? cation and veri?cation of distributed systems - security issues in distributed computing and systems - distributed collaborative environments - location- and context-aware systems - overlay network architectures In response to the call for papers for OPODIS 2004, in total 102 papers in the above areas were submitted from 28 countries from over the world. Each paper was reviewed by three reviewers, and judged according to scienti?c and presentationquality,originality andrelevance to the conference topics. Then the ProgramCommitteeselected30papers. Theacceptanceratiowaslessthan30%. Besides the technical contributed papers, the program included two exciting invited talks: Prof. David Lee (Ohio State University, USA) and Dr.
Die Vernetzung von industriellen Produktionssystemen soll in Zukunft auf Basis von Ethernet Time Sensitive Networks (TSN) umgesetzt werden. Die Einfuhrung einer neuen Netzwerktechnik in die Feldebene der industriellen Produktion stellt jedoch eine besondere Herausforderung dar, da neben Netzwerkfunktionen eine echtzeitfahige Implementierung von Protokollen und spezifischen Anwendungen in die Feldgerate erforderlich ist. Bei haufig geringen Stuckzahlen der anwendungsspezifischen Gerate sind derartige Neuentwicklungen haufig wirtschaftlich nicht tragbar. Migrationsstrategien kommt daher eine entsprechend grosse Bedeutung zu. Die Forschungsfrage dieser Arbeit lautet: Wie koennen bestehende Gerate des Echtzeit-Ethernet-Systems PROFINET mit den geforderten Funktions- und Leistungsmerkmalen wie Zeitsynchronisation und synchronisierte Kommunikation kompatibel mit Ethernet TSN-Netzwerken genutzt werden? Der Autor entwickelte Kompatibilitatsverfahren, mit denen dies moeglich wird. Das zentrale Kompatibilitatsverfahren ist der Ethernet TSN-kompatible Bridging-Modus Time Aware Forwarding (TAF), der zeitgesteuerte Kommunikation auf der Basis der Empfangszeit zeitrichtig weiterleitet und per Softwareupdate auf bestehender PROFINET-Hardware implementiert werden kann. Diese Gerate koennen damit in TSN-Netzwerke integriert werden und synchronisierte Kommunikation mit einem Jitter kleiner als 1 s nutzen.
Including contributions from leading experts in the field, this book covers applications and developments of heuristic search methods for solving complex optimization problems. The book covers various local search strategies including genetic algorithms, simulated annealing, tabu search and hybrids thereof. These methods have proved extraordinarily successful by solving some of the most difficult, real-world problems. At the interface between Artificial Intelligence and Operational Research, research in this exciting area is progressing apace spurred on by the needs of industry and commerce. The introductory chapter provides a clear overview of the basic techniques and useful pointers to further reading and to current research. The second section of the book covers some of the most recent and exciting developments of the basic techniques, with suggestions not only for extending and improving these but also for hybridizing and incorporating automatic adaption. The third section contains a number of case studies, surveys and comparative studies which span a wide range of application areas ranging from the classic Steiner tree problem to more practical problems arising in telecommunications and data analysis. The coverage of the latest research and the illustrative case studies will ensure that the book is invaluable for researchers and professionals with an interest in heuristic search methods.
A comprehensive look at General automata and how it can be used to establish the fundamentals for communication in human-computer systems Drawing on author Eldo C. Koenig's extensive expertise and culling from his thirty-four previously published works, this seminal resource presents knowledge structures for communication in Human-Computer Systems (HCS) based on General automata. The resulting model provides knowledge representations for software engineering. Of the many features required for a method to achieve the desired communication in HCS, Knowledge Structures for Communications in Human-Computer Systems identifies six of them in great length--extracting and storing the knowledge of sentences; knowledge association; deductive processes; inferences; feedback; and sequencing of knowledge--along with illustrations for achieving them by the General Automata Method. After presenting the analysis for each feature, the book includes practical applications that illustrate the results. Koenig also describes algorithms and programs that achieve some of the features, and provides readers with additional algorithms and further research. Richly illustrated throughout to elucidate concepts, Knowledge Structures for Communications in Human-Computer Systems is an excellent teaching text suitable for both academic and industrial settings.
This book constitutes the proceedings of the 14th International Conference on Green, Pervasive, and Cloud Computing, GPC 2019, held in Uberlandia, Brazil, in May 2019. The 17 full papers included in this volume were carefully reviewed and selected from 38 initial submissions. They are organized in the following topical sections: machine learning; Internet of Things and mobility; cloud and related technologies.
This book constitutes the proceedings of the 7th International Workshop on Design, Modeling, and Evaluation of Cyber Physical Systems, CyPhy2017, held in conjunction with ESWeek 2017, in Seoul, South Korea, in October 2017. The 10 papers presented together with 1 extended and 1 invited abstracts in this volume were carefully reviewed and selected from 16 submissions. The conference presents a wide range of domains including robotics; smart homes, vehicles, and buildings; medical implants; and future-generation sensor networks.
This book constitutes the thoroughly refereed post-conference proceedings of the First International Workshop on Gerotechnology, IWoG 2018, held in Caceres, Spain on December 14, 2018, and in Evora, Portugal, on December 17, 2018. The 24 revised full papers along with 8 short papers presented were carefully reviewed and selected from 71 submissions.The papers are organized in topical sections on knowledge management for health: context, cognition, behavior and user modeling; technologies to increase the quality of life of the elderly population; Internet of Things (IoT); smarts technologies and algorithms for health; monitoring and management of chronic and non-chronic diseases;solutions for active aging, social integration and self-care; health interventions to support caregivers of elderly people; public health initiatives.
This book constitutes the refereed proceedings of the 22nd International Conference on Applications of Evolutionary Computation, EvoApplications 2019, held in Leipzig, Germany, in April 2019, co-located with the Evo*2019 events EuroGP, EvoCOP and EvoMUSART. The 44 revised full papers presented were carefully reviewed and selected from 66 submissions. They were organized in topical sections named: Engineering and Real World Applications; Games; General; Image and Signal Processing; Life Sciences; Networks and Distributed Systems; Neuroevolution and Data Analytics; Numerical Optimization: Theory, Benchmarks, and Applications; Robotics.
This book constitutes the thoroughly refereed post-workshop proceedings of the 5th International Workshop on Modelling and Simulation for Autonomous Systems, MESAS 2018, held in Prague, Czech Republic, in October 2018. The 46 revised full papers included in the volume were carefully reviewed and selected from 66 submissions. They are organized in the following topical sections: Future Challenges of Advanced M&S Technology; Swarming - R&D and Application; M&S of Intelligent Systems - AI, R&D and Application; AxS in Context of Future Warfare and Security Environment (Concepts, Applications, Training, Interoperability, etc.).
This open access book is about public open spaces, about people, and about the relationship between them and the role of technology in this relationship. It is about different approaches, methods, empirical studies, and concerns about a phenomenon that is increasingly being in the centre of sciences and strategies - the penetration of digital technologies in the urban space. As the main outcome of the CyberParks Project, this book aims at fostering the understanding about the current and future interactions of the nexus people, public spaces and technology. It addresses a wide range of challenges and multidisciplinary perspectives on emerging phenomena related to the penetration of technology in people's lifestyles - affecting therefore the whole society, and with this, the production and use of public spaces. Cyberparks coined the term cyberpark to describe the mediated public space, that emerging type of urban spaces where nature and cybertechnologies blend together to generate hybrid experiences and enhance quality of life.
This book constitutes the thoroughly refereed proceedings of the 12th International Conference on Metadata and Semantic Research, MTSR 2018, held in Limassol, Cyprus, on October 23-26, 2018. The 19 full and 16 short papers presented were carefully reviewed and selected from 77 submissions. The papers are organized in topical sections on metadata, linked data, semantics, ontologies and SKOS; digital libraries, information retrieval, big, linked, social and open data; cultural collections and applications; Knowledge IT Artifacts (KITA) in professional communities and aggregations; Digital Humanities and Digital Curation (DHC); European and national projects; agriculture, food and environment; open repositories, research information systems and data infrastructures.
This book constitutes the proceedings of the 15th International Symposium on Applied Reconfigurable Computing, ARC 2019, held in Darmstadt, Germany, in April 2019. The 20 full papers and 7 short papers presented in this volume were carefully reviewed and selected from 52 submissions. In addition, the volume contains 1 invited paper. The papers were organized in topical sections named: Applications; partial reconfiguration and security; image/video processing; high-level synthesis; CGRAs and vector processing; architectures; design frameworks and methodology; convolutional neural networks. |
![]() ![]() You may like...
Central and South-Eastern Europe 2002
Europa Publications
Hardcover
Costa Rica - A Global Studies Handbook
Meg Tyler Mitchell, Scott Pentzer
Hardcover
R2,551
Discovery Miles 25 510
|