Gjør som tusenvis av andre bokelskere
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.Du kan når som helst melde deg av våre nyhetsbrev.
The present volume is intended as a reference book on Wikipedia corpus studies, from corpus construction to exploration and analysis. Wikipedia is a complex object, difficult to manipulate for linguists and corpus researchers. In addition to the encyclopedic articles consulted by millions of users, it contains vast spaces of written discussions, aka talk pages, where Wikipedia authors negotiate the collaborative editing of articles, make evaluations, or discuss related topics. The proposed volume covers Wikipedia articles, their revision histories, and discussions, with a focus on discussions, which have not been studied extensively so far and have also been neglected in previous corpus building efforts. Wikipedia discussions are instances of computer-mediated communication (CMC), thus constituting a completely different, interaction-oriented linguistic genre. Sophisticated tools and methods of linguistic annotation and corpus exploration are needed to exploit the huge and valuable corpus resources that can be constructed from the Wikipedia discussions. The present volume aims at encouraging and facilitating Wikipedia corpus studies, providing standards, recommendations, and innovative methods to build and explore Wikipedia corpora, and presenting corpus studies that make the most of the peculiarities of Wikipedia.
Contents-Basic Foundations of Pattern Recognition and Artificial Intelligence, Methodologies of Machine Vision and Image Processing, Intelligent Pattern Recognition Systems, 3-D Object Pattern Analysis, Modelling and Simulation, Analysis of DNA Microarray Gene Expression Data based on Pattern Recognition Methods, PRMV Applications.
This book is the outcome of the special session on Green Communications at 'The 12th International Symposium on Wireless Personal Multimedia Communications' (WPMC) held in September '09 in Sendai, Japan.
An authoritative guide that explores in depth the cultural, technological and methodological concerns to practice three-timezone (3TZ) e-learning in educational contexts.
Multihop Mobile Wireless Networks discusses issues pertaining to each of these networks and proposes novel and innovative algorithms on Scheduling, Routing and Data aggregation that are viable solutions for multihop mobile networks. Moreover, the book provides the preliminaries and an excellent review on existing approaches in wireless communications. Multihop Mobile Wireless Networks is suitable for academic and industrial research, and can be used for advanced courses in Senior Undergraduate and Graduate programs.
This is the fifth publication under the IIIT-A Series on e-Governance. It is a collection of 20 articles based on the presentations made in the Seminars. This book will of interest to all stakeholders in the disability rehabilitation management as the population of people with disabilities in growing.
Network traffic has fractal properties such as impulsiveness, selfsimilarity, and long-range dependence over several time scales, from milliseconds to minutes. These features have motivated the development of new traffic models and traffic control algorithms. This book presents a new statespace model for Internet traffic, which is based on a finite-dimensional representation of the Autoregressive Fractionally Integrated Moving Average (ARFIMA) random process. The modeling via Autoregressive (AR) processes is also investigated.
The book arose based on the most interesting papers from this area published at IDAACS?2013 conference. However, the indivudual chapters include not only designed solution in wider context but also relevant theoretical parts, achieved results and possible future ways.
The Internet of Things is a wide-reaching network of devices, and these devices can intercommunicate and collaborate with each other to produce variety of services at any time, any place, and in any way. Maintaining access control, authentication and managing the identity of devices while they interact with other devices, services and people is an important challenge for identity management. The identity management presents significant challenges in the current Internet communication. These challenges are exacerbated in the internet of things by the unbound number of devices and expected limitations in constrained resources. Current identity management solutions are mainly concerned with identities that are used by end users, and services to identify themselves in the networked world. However, these identity management solutions are designed by considering that significant resources are available and applicability of these identity management solutions to the resource constrained internet of things needs a thorough analysis. Technical topics discussed in the book include:* Internet of Things;* Identity Management;* Identity models in Internet of Things;* Identity management and trust in the Internet of Things context;* Authentication and access control;Identitymanagement for Internet of Things contributes to the area of identity management for ubiquitous devices in the Internet of Things. It initially presents the motivational factors together with the identity management problems in the context of Internet of Things and proposes an identity management framework. Following this, it refers to the major challenges for Identitymanagement and presents different identity management models. This book also presents relationship between identity and trust, different approaches for trust management, authentication and access control.
This book is based on the research work undertaken by the authors on the theme "Mining of Educational Data for the Analysis and Prediction of Students' Academic Performance". The basic know-how presented can be treated as guide for educational data mining implementation using R and Rattle open source data mining tools.
The theme of this book is "Role of ICT for multi-disciplinary applications in 2030", which is absolutely appropriate to explore with regard to the CONASENSE vision of looking at services utilizing the Communications, Navigation, Sensing and Services (CONASENSE) paradigm in a period of 20-50 years from now.
This textbook is intended for a course on digital signal processing. Key features of the book include extensive use of MATLAB based examples to illustrate how to solve signal processing problems; worked-out examples to explain new and difficult concepts; and the inclusion of FIR and IIR filter design.
High Efficiency Video Coding and Other Emerging Standards provides an overview of high efficiency video coding (HEVC) and all its extensions and profiles. There are nearly 300 projects and problems included, and about 400 references related to HEVC alone. Next generation video coding (NGVC) beyond HEVC is also described. Other video coding standards such as AVS2, DAALA, THOR, VP9 (Google), DIRAC, VC1, and AV1 are addressed, and image coding standards such as JPEG, JPEG-LS, JPEG2000, JPEG XR, JPEG XS, JPEG XT and JPEG-Pleno are also listed.Understanding of these standards and their implementation is facilitated by overview papers, standards documents, reference software, software manuals, test sequences, source codes, tutorials, keynote speakers, panel discussions, reflector and ftp/web sites - all in the public domain. Access to these categories is also provided.
Certifications of Critical Systems - The CECRIS Experience documents the main insights on Cost Effective Verification and Validation processes that were gained during work in the European Research Project CECRIS (acronym for Certification of Critical Systems).
This book introduces several cybersecurity and privacy research challenges and how they are being addressed in the scope of 15 European research projects.Each chapter is dedicated to a different funded European Research project, which aims to cope with digital security and privacy aspects, risks, threats and cybersecurity issues.
The book contains a mixture of machine learning foundations, deep learning, artificial intelligence, statistics and evolutionary learning mathematics written from the usage point of view with rich explanations on what the concepts mean.
Cybersecurity needs a change in communication. It is time to show the world that cybersecurity is an exciting and diverse field to work in. Cybersecurity is not only about hackers and technical gobbledygook. It is a diverse field of work with a lot of collaboration with other disciplines. Over the years, security professionals have tried different awareness strategies to promote their work and to improve the knowledge of their audience but without much success. Communication problems are holding back advances in in the field.Visual Communication for Cybersecurity explores the possibilities of visual communication as a tool to improve the communication about cybersecurity and to better connect with non-experts. Visual communication is useful to explain complex topics and to solve complex problems. Visual tools are easy to share through social media and have the possibility to reach a wide audience. When applied strategically, visual communication can contribute to a people-centric approach to security, where employees are encouraged to actively engage in security activities rather than simply complying with the policies.Cybersecurity education does not usually include communication theory or creative skills. Many experts think that it is not part of their job and is best left to the communication department or they think that they lack any creative talent. This book introduces communication theories and models, gives practical tips, and shows many examples. The book can support students in cybersecurity education and professionals searching for alternatives to bullet-point presentations and textual reports. On top of that, if this book succeeds in inspiring the reader to start creating visuals, it may also give the reader the pleasure of seeing new possibilities and improving their performance.
Robots, autonomous vehicles, unmanned aerial vehicles, and smart factory, will significantly change human living style in digital society. Artificial Intelligence in Wireless Robotics introduces how wireless communications and networking technology enhances facilitation of artificial intelligence in robotics, which bridges basic multi-disciplinary knowledge among artificial intelligence, wireless communications, computing, and control in robotics. A unique aspect of the book is to introduce applying communication and signal processing techniques to enhance traditional artificial intelligence in robotics and multi-agent systems.The technical contents of this book include fundamental knowledge in robotics, cyber-physical systems, artificial intelligence, statistical decision and Markov decision process, reinforcement learning, state estimation, localization, computer vision and multi-modal data fusion, robot planning, multi-agent systems, networked multi-agent systems, security and robustness of networked robots, and ultra-reliable and low-latency machine-to-machine networking. Examples and exercises are provided for easy and effective comprehension.Engineers wishing to extend knowledge in the robotics, AI, and wireless communications, would be benefited from this book. In the meantime, the book is ready as a textbook for senior undergraduate students or first-year graduate students in electrical engineering, computer engineering, computer science, and general engineering students. The readers of this book shall have basic knowledge in undergraduate probability and linear algebra, and basic programming capability, in order to enjoy deep reading.
The organizational environment in the 21st century is not what it was in the 20th Century. It metamorphosed with bulk outsourcing and computer-based decision support tools, and easily coupled with low-cost PC hardware which has created improvements in the productivity of the people, resulting in the reduced numbers. Managers of today manage the results expected of the position rather than managing to get things done as it was expected.In the physical sciences, academia leads the industry whilst in social sciences like management, marketing and economics, industry leads academia. To bridge the knowledge gap that exists between theory and practice, two practitioners from the industry have authored Managing People at Work - A New Paradigm for the 21st Century.
The operational theme permeating most definitions of the IoT concept, is the wireless communication of networked objects, in particular, smart sensing devices and machines, exchanging data a la Internet. In this book, a detailed look is taken at the fundamental principles of devices and techniques whose exploitation will facilitate the development of compact, power-efficient, autonomous, smart, networked sensing nodes underlying and encompassing the emerging IoT era.The book provides an understanding of nanoelectromechanical quantum circuits and systems (NEMX), as exemplified by firstly the uncovering of their origins, impetus and motivation, and secondly by developing an understanding of their device physics, including, the topics of actuation, mechanical vibration and sensing. Next the fundamentals of key devices, namely, MEMS/NEMS switches, varactors and resonators are covered, including a wide range of implementations. The book then looks at their energy supply via energy harvesting, as derived from wireless energy and mechanical vibrations. Finally, after an introduction to the fundamentals of IoT networks and nodes, the book concludes with an exploration of how the NEMX components are encroaching in a variety of emerging IoT applications.
This book aims to provide a comprehensive update of the latest scientific research, mainly in VR and partly in AR, from the last five years. The content is themed around the application areas of training, education, robotics, health and well-being, and user experience.
Over the past decade, tremendous development of wireless communications has changed human life and engineering. Considerable advancement has been made in design and architecture of related RF and microwave circuits. Introduction to Wireless Communication Circuits focuses on special circuits dedicated to the RF level of wireless communications. From oscillators to modulation and demodulation, and from mixers to RF and power amplifier circuits, all are presented in a sequential manner. A wealth of analytical relations is provided in the text alongside various worked out examples. Related problem sets are given at the end of each chapter. Basic concepts of RF Analog Circuit Design are developed in the book. Technical topics discussed include:- Wireless Communication System- RF Oscillators and Phase Locked Loops- Modulator and Demodulator Circuits- RF Mixers- Automatic Gain Control and Limiters- Microwave Circuits, Transmission Lines and S-Parameters- Matching Networks- Linear Amplifier Design and Power Amplifiers- Linearization TechniquesThis textbook is intended for advanced undergraduate and graduate students, as well as RF Engineers and professionals.
Overall, the book covers two broad topics: general AI advances, and applications to neuromorphic computing.Technical topics discussed in the book include:1. Research Directions in AI algorithms and systems 2. An ARM perspective on hardware requirements and challenges for AI3.
Big Data is a concept of major relevance in today's world, sometimes highlighted as a key asset for productivity growth, innovation, and customer relationship, whose popularity has increased considerably during the last years. Areas like smart cities, manufacturing, retail, finance, software development, environment, digital media, among others, can benefit from the collection, storage, processing, and analysis of Big Data, leveraging unprecedented data-driven workflows and considerably improved decision-making processes.The concept of a Big Data Warehouse (BDW) is emerging as either an augmentation or a replacement of the traditional Data Warehouse (DW), a concept that has a long history as one of the most valuable enterprise data assets. Nevertheless, research in Big Data Warehousing is still in its infancy, lacking an integrated and validated approach for designing and implementing both the logical layer (data models, data flows, and interoperability between components) and the physical layer (technological infrastructure) of these complex systems. This book addresses models and methods for designing and implementing Big Data Systems to support mixed and complex decision processes, giving special attention to BDWs as a way of efficiently storing and processing batch or streaming data for structured or semi-structured analytical problems.
Cyber immune systems try to mimic the adaptive immune system of humans and animals because of its capability to detect and fend off new, unseen pathogens. Today's current cyber security systems provide an effective defense mechanism against known cyber-attacks but are not so good when it comes to defending against unknown attacks. This book describes the possible development and organization of self-healing computing based on cyber immunity techniques and aimed at working in the new realm of Industry 4.0. Industry 4.0 is the trend towards automation and data exchange in manufacturing technologies and processes which include cyber-physical systems (CPS), the internet of things (IoT), industrial internet of things (IIOT), cloud computing, cognitive computing and artificial intelligence. The book describes the author's research and development of cyber-immunity systems that will prevent the destruction of critical information infrastructure by future unknown cyber-attacks and thus avoid the significant or catastrophic consequences of such attacks.The book is designed for undergraduate and post-graduate students, for engineers in related fields as well as managers of corporate and state structures, chief information officers (CIO), chief information security officers (CISO), architects, and research engineers in the field of cybersecurity.This book contains four chapters1. Cyber Immunity Concept of the Industry 4.0; 2. Mathematical Framework for Immune Protection of Industry 4.0; 3. Trends and prospects of the development of Immune Protection of Industry 4.0; 4. From detecting cyber-attacks to self-healing Industry 4.0;
Text analytics consist of the statistics about a text element, which includes the word count, the word histogram, and the word frequency histogram. Most text documents of value are related to other-sometimes many other-documents, and so analytics describing the relative frequency of terms in a document compared to its peers are important for defining key words (tagging, labeling, indexing), search-responsive terms (query terms), and compressed versions of the documents (key words, summary, etc.).This clearly written text explains the functional applications of search, translation, optimization, and learning with regard to text analytics. Generation of analytics is aided by a hybrid, ensemble, or other combinatorial approach in which two or more effective analytic processes are used simultaneously, and their outputs combined to form a better "e;consensus"e;. Additional value to the preservation of the information is provided through these methods. Also, since they encompass capabilities of two or more knowledge-generating systems, they can create a "e;superset"e; of access points to the data generated. The book also describes the role of functional approaches in the testing and configuration of these systems.
This book, which belongs to the "Tutorials in Circuits and Systems" series, provides readers with an overview of new developments in the field of biomedical circuits and systems.
The book provides examples with supporting MATLAB codes and hands-on projects throughout to improve the ability of the readers to understand and implement variety of algorithms.
This includes confirmed cases, active cases, cured cases and deaths in each country. This data set can be used for predicting the active cases across different regions of the world so that appropriate amount of health infrastructure can be made available to these places.
Since the launch of Second-Generation Networks (2G), planning for each future mobile service was initiated many years before its commercial launch. In 2019, 5G Networks begun to be deployed commercially after almost ten years of planning. Similarly, the race for the 6G wireless networks that will be operational in 2030 has already started. To fulfill its potential in the upcoming decade, 6G will undoubtedly require an architectural orchestration based on the amalgamation of existing solutions and innovative technologies. The book will begin by evaluating the state of the art of all current mobile generations' while looking into their core building blocks. 6G implementation will require fundamental support from Artificial Intelligence (AI) and Machine Learning on the network's edge and core, including a new Radio Frequency (RF) spectrum. The 6G use cases will require advanced techniques for enabling the future wireless network to be human-centric, ensuring enhanced quality of experience (QoE) for most of its applications. The concept of Human Bond Communication Beyond 2050 (Knowledge Home) and Communication, Navigation, Sensing, and Services (CONASENSE) will also profit from future wireless communication. Terahertz domains will exploit the ultra-Massive Multiple Input Multiple Output Antennas (UM-MIMO) technologies to support Terabits' data throughputs.Moreover, optical wireless communications (OWC) will also come into play to support indoor and outdoor high-data rates. Further expansion of 6G core entities will support the novel concept of Society 5.0. Quantum computing processing and communications is also likely to be added into the 6G ecosystem with security managed by blockchain orchestration for a robust network.
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.