|
Showing 1 - 11 of
11 matches in All Departments
Recent advances in socio-cognitive and affective computing require
further study as countless benefits and opportunities have emerged
from these innovative technologies that may be useful in a number
of contexts throughout daily life. In order to ensure these
technologies are appropriately utilized across sectors, the
challenges and strategies for adoption as well as potential uses
must be thoroughly considered. Principles and Applications of
Socio-Cognitive and Affective Computing discusses several aspects
of affective interactions and concepts in affective computing, the
fundamentals of emotions, and emerging research and exciting
techniques for bridging the emotional disparity between humans and
machines, all within the context of interactions. The book also
considers problem and solution guidelines emerging in cognitive
computing, thus summarizing the roadmap of current machine
computational intelligence techniques for affective computing.
Covering a range of topics such as social interaction, robotics,
and virtual reality, this reference work is crucial for scientists,
engineers, industry professionals, academicians, researchers,
scholars, practitioners, instructors, and students.
With the rapid advancement in technology, a myriad of new threats
have emerged in online environments. The broad spectrum of these
digital risks requires new and innovative methods for protection
against cybercrimes. Combating Security Breaches and Criminal
Activity in the Digital Sphere is a pivotal reference source for
the latest scholarly research on current trends in cyber forensic
investigations, focusing on advanced techniques for protecting
information security and preventing potential exploitation for
online users. Featuring law enforcement perspectives, theoretical
foundations, and forensic methods, this book is ideally designed
for policy makers, analysts, researchers, technology developers,
and upper-level students.
The rate of cybercrimes is increasing because of the fast-paced
advancements in computer and internet technology. Crimes employing
mobile devices, data embedding/mining systems, computers, network
communications, or any malware impose a huge threat to data
security. Countering Cyber Attacks and Preserving the Integrity and
Availability of Critical Systems addresses current problems and
issues emerging in cyber forensics and investigations and proposes
new solutions that can be adopted and implemented to counter
security breaches within various organizations. The publication
examines a variety of topics such as advanced techniques for
forensic developments in computer and communication-link
environments and legal perspectives including procedures for cyber
investigations, standards, and policies. It is designed for
policymakers, forensic analysts, technology developers, security
administrators, academicians, researchers, and students.
This book presents the proceedings of the International Virtual
Conference on Industry 4.0 (IVCI4.0 2020). This conference brings
together specialists from the academia and industry sectors to
promote the exchange of knowledge, ideas, and information on the
latest developments and applied technologies in the field of
Industry 4.0. The book discusses a wide range of topics such as the
design of smart and intelligent products, developments in recent
technologies, rapid prototyping and reverse engineering, multistage
manufacturing processes, manufacturing automation in the Industry
4.0 model, cloud-based products, and cyber-physical and
reconfigurable systems, etc. The volume supports the transfer of
vital knowledge to the next generation of academics and
practitioners.
Humans have the most advanced method of communication, which is
known as natural language. While humans can use computers to send
voice and text messages to each other, computers do not innately
know how to process natural language. In recent years, deep
learning has primarily transformed the perspectives of a variety of
fields in artificial intelligence (AI), including speech, vision,
and natural language processing (NLP). The extensive success of
deep learning in a wide variety of applications has served as a
benchmark for the many downstream tasks in AI. The field of
computer vision has taken great leaps in recent years and surpassed
humans in tasks related to detecting and labeling objects thanks to
advances in deep learning and neural networks. Deep Learning
Research Applications for Natural Language Processing explains the
concepts and state-of-the-art research in the fields of NLP,
speech, and computer vision. It provides insights into using the
tools and libraries in Python for real-world applications. Covering
topics such as deep learning algorithms, neural networks, and
advanced prediction, this premier reference source is an excellent
resource for computational linguists, software engineers, IT
managers, computer scientists, students and faculty of higher
education, libraries, researchers, and academicians.
This book presents the proceedings of the International Virtual
Conference on Industry 4.0 (IVCI4.0 2020). This conference brings
together specialists from the academia and industry sectors to
promote the exchange of knowledge, ideas, and information on the
latest developments and applied technologies in the field of
Industry 4.0. The book discusses a wide range of topics such as the
design of smart and intelligent products, developments in recent
technologies, rapid prototyping and reverse engineering, multistage
manufacturing processes, manufacturing automation in the Industry
4.0 model, cloud-based products, and cyber-physical and
reconfigurable systems, etc. The volume supports the transfer of
vital knowledge to the next generation of academics and
practitioners.
This book constitutes thoroughly refereed post-conference
proceedings of the International Applied Soft Computing and
Communication Networks (ACN 2020) held in VIT, Chennai, India,
during October 14-17, 2020. The research papers presented were
carefully reviewed and selected from several initial submissions.
The book is directed to the researchers and scientists engaged in
various fields of intelligent systems.
Recent advances in socio-cognitive and affective computing require
further study as countless benefits and opportunities have emerged
from these innovative technologies that may be useful in a number
of contexts throughout daily life. In order to ensure these
technologies are appropriately utilized across sectors, the
challenges and strategies for adoption as well as potential uses
must be thoroughly considered. Principles and Applications of
Socio-Cognitive and Affective Computing discusses several aspects
of affective interactions and concepts in affective computing, the
fundamentals of emotions, and emerging research and exciting
techniques for bridging the emotional disparity between humans and
machines, all within the context of interactions. The book also
considers problem and solution guidelines emerging in cognitive
computing, thus summarizing the roadmap of current machine
computational intelligence techniques for affective computing.
Covering a range of topics such as social interaction, robotics,
and virtual reality, this reference work is crucial for scientists,
engineers, industry professionals, academicians, researchers,
scholars, practitioners, instructors, and students.
The rate of cybercrimes is increasing because of the fast-paced
advancements in computer and internet technology. Crimes employing
mobile devices, data embedding/mining systems, computers, network
communications, or any malware impose a huge threat to data
security. Countering Cyber Attacks and Preserving the Integrity and
Availability of Critical Systems addresses current problems and
issues emerging in cyber forensics and investigations and proposes
new solutions that can be adopted and implemented to counter
security breaches within various organizations. The publication
examines a variety of topics such as advanced techniques for
forensic developments in computer and communication-link
environments and legal perspectives including procedures for cyber
investigations, standards, and policies. It is designed for
policymakers, forensic analysts, technology developers, security
administrators, academicians, researchers, and students.
This book presents the need for intrusion detection system as it
has become an essential concern with the growing use of internet
and increased network attacks such as virus, Trojan horse, worms
and creative hackers. In addition, the basic details about the
historic origin of IDS, the types of IDS, their deployment schemes
and general architecture are considered. IDS using various machine
learning techniques like fuzzy logic, genetic algorithm, neural
network, decision tree etc are discussed and their pros and cons
are discussed. Another potential approach is ensemble learning,
which have been successfully applied to IDS for differentiating
normal and anomalous types. In this book, various ensemble
approaches like neuro-genetic, neuro-fuzzy, neurotree etc are
explained. The implementation of these IDS depends again on the
requirement of the security administrator. The IDS discussed in
this book are adaptive to new environments by updating the audit
data with recent attacks. If new attacks are identified these
approaches can store the attack patterns in log generator for
detecting future attacks.
|
You may like...
The Expendables 4
Jason Statham, Sylvester Stallone
Blu-ray disc
R329
Discovery Miles 3 290
|