Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
This book constitutes the refereed proceedings of the 4th International Conference on Distributed Artificial Intelligence, DAI 2022, held in Tianjin, China, in December 2022. The 5 full papers presented in this book were carefully reviewed and selected from 12 submissions. DAI aims at bringing together international researchers and practitioners in related areas including general AI, multiagent systems, distributed learning, computational game theory, etc., to provide a single, high-profile, internationally renowned forum for research in the theory and practice of distributed AI.
¿Diese erweiterte 2. Auflage richtet sich an die regelmäßigen Benutzer von IT, also Berufstätige sowie Schüler, Studierende und Lehrer. Das Buch beschreibt das relevante Universum der Informatik und der Informationstechnologie, von den grundlegenden Prinzipien bis zur sozialen und gesellschaftspolitischen Bedeutung. Neu und erweitert sind u. a. Themen zu virtuellen Welten, zum Metaversum, zu digitalen Zwillingen sowie zu Aspekten von Verwaltung und Digitalisierung. Anhand zahlreicher Beispiele sowie Illustrationen und Grafiken wird die relevante IT-Umgebung der modernen Nichtfachperson dargestellt. Büroapplikationen, soziale Medien, Spiele und Hardwaretrends sowie die verwendeten Devices werden erklärt und in Zusammenhang gebracht.In einem Kapitel werden die ersten Grundlagen zur Programmierung der sehr populären Blocksprache Scratch gelegt. Zu jedem Kapitel werden zehn Fragen zum Inhalt gestellt, um dem Leser oder der Leserin eine Stütze zum gelesenen Inhalt zu geben und die Kompetenzen zu erweitern.Der InhaltGanz kurze Geschichte der IT · Alles ist Zahl · Computer als Hardware · Betriebssystem und Benutzeroberfläche · Netzwerke · Datenorganisation · IT-Entwicklung · IT-Organisation · Programmierung · Applikationen · Cloud-Computing · Sicherheit · Information und Medien · Künstliche Intelligenz · Virtuelle Welten · IT, Digitalisierung und GesellschaftDie ZielgruppenAlle Professionals mit Interesse an IT und InformatikSachbearbeiter mit BüroarbeitsplatzSchüler, Lehrer, ElternDer AutorClaudio Franzetti hat nach dem Studium der Ingenieurwissenschaften an der ETH Zürich als Forschungsingenieur bei BBC und ABB im Bereich Computational Fluid Dynamics gearbeitet und intensive Erfahrungen in der Simulation auf Großrechnern erlangt. Nach einem Betriebswirtschaftsstudium an der Hochschule St. Gallen hat er im Bereich Finanzen bei Versicherungen und Banken gearbeitet, wo er auch für quantitative Risikoberechnungen und zum Teil für die Gesamt-IT zuständig war.
Was wissen Maschinen? Können sie wirklich mit uns sprechen? Haben sie Bewusstsein? Was ist gemeint, wenn Roboter als ¿verkörperte KI¿ oder als ¿autonom¿ bezeichnet werden? Vorliegendes Buch stellt sich diesen und weiteren Fragen. Denn Technikethik ist eng mit theoretischen Herausforderungen verbunden. Vor diesem Hintergrund wird in die Erkenntnislehre, Sprachanalyse, Körper-Geist-Verhältnisse sowie die Philosophie des Geistes systematisch eingeführt. Manches, das wir Maschinen vorschnell zuschreiben, entpuppt sich bei genauer Betrachtung als Schein. Warum ist das so? Mit Beispielen, Tabellen und Übersichten werden Antworten eingängig und strukturiert erarbeitet. Das Buch richtet sich an Ingenieurwissenschaftler*innen, Informatiker*innen und Geisteswissenschaftler*innen im Berufsalltag, aber auch an interessierte Lai*innen, die Möglichkeiten und Grenzen der KI kritisch hinterfragen wollen. Es bildet den vierten, in sich abgerundeten Teil der Buchreihe Grundlagen der Technikethik.Haben Maschinen den Geist, den wir brauchen, und brauchen wir den Geist, in dem wir Maschinen designen?
Die Befugnisse der Strafverfolgungsbehörden für die Erhebungen von Daten bei Privaten - primär die §§ 94 ff. sowie § 161 I 1 StPO - stammen im Kern noch aus dem 19. Jahrhundert. Können diese in Anbetracht der Entwicklung der verfassungsrechtlichen Maßstäbe des Datenschutzrechts noch eine verfassungsrechtlich tragfähige Eingriffsgrundlage bilden? Emma Peters setzt sich mit den tatsächlichen Kommunikationsbedingungen der Informationsgesellschaft, den Reaktionen in der Praxis der Strafverfolgung im Rahmen des einfachen Rechts sowie der Rechtsprechung des Bundesverfassungsgerichts zum Datenschutzrecht auseinander. Sie zeigt auf, dass die scheinbar selbstverständlichen Ermittlungsbefugnisse zur Datenerhebung bei Privaten mit der Entwicklung des Datenschutzes in den letzten 20 Jahren, wie sie insbesondere in der Rechtsprechung des Ersten Senats des Bundesverfassungsgerichts geprägt wurden, nicht mehr ohne weiteres vereinbar sind und grundlegendem Reformbedarf unterliegen.
This book focusses on recent and emerging techniques for enhancement of smart healthcare, smart communication, and smart transportation system. It covers topics ranging from Machine learning techniques, IoT, Security aspects of medical documents, Performance of various protocols used in the communication and transportation environment.
This book proposes that the solution to growing burden of carbon emission lies within the technology innovation as continued advancements in processes make businesses lean and smart.
Smartphones and Information on Current Events provides unprecedented insights into young people's news consumption patterns and the ecology of mobile news. Advancing our knowledge of mobile behaviour, the book also highlights the ways in which mobile news impacts the lives of the general public.
This volume provides the basis for contemporary privacy and social media research and informs global as well as local initiatives to address issues related to social media privacy through research, policymaking, and education.Renowned scholars in the fields of communication, psychology, philosophy, informatics, and law look back on the last decade of privacy research and project how the topic will develop in the next decade. The text begins with an overview of key scholarship in online privacy, expands to focus on influential factors shaping privacy perceptions and behaviors - such as culture, gender, and trust - and continues with specific examinations of concerns around vulnerable populations such as children and older adults. It then looks at how privacy is managed and the implications of interacting with artificial intelligence, concluding by discussing feasible solutions to some of the more pressing questions surrounding online privacy.This handbook will be a valuable resource for advanced students, scholars, and policymakers in the fields of communication studies, digital media studies, psychology, and computer science.
Features new research on the contributions of IoT and cloud technology in healthcare information systems for the improvement of patient care and disease management. The chapters showcase the interface between e-health and communication technologies and their contribution to building efficient and secure healthcare information systems.
Humanized AI (HAI), emerging as the next of the AI waves, refers to artificial social beings that are very close to humans in various aspects, beings who are machine-race humans, not digital slaves. Foundation, Architecture and Prototyping of Humanized AI deploys a novel small-data approach to vertically explore the spectrum of HAI.
This book is aimed at managerial decision-makers, practitioners in any field, and the academic community. The chapter authors have integrated theory with evidence-based practice to go beyond merely explaining cybersecurity topics.
This book is aimed at managerial decision-makers, practitioners in any field, and the academic community. The chapter authors have integrated theory with evidence-based practice to go beyond merely explaining cybersecurity topics.
The text comprehensively discusses the fundamental aspects of human-computer interaction, and applications of artificial intelligence in diverse areas including disaster management, smart infrastructures, and healthcare.
Object Lessons is a series of short, beautifully designed books about the hidden lives of ordinary things.Barcodes are about as ordinary as an object can be. Billions of them are scanned each day and they impact everything from how we shop to how we travel to how the global economy is managed. But few people likely give them more than a second thought. In a way, the barcode's ordinariness is the ultimate symbol of its success.However, behind the mundanity of the barcode lies an important history. Barcodes bridged the gap between physical objects and digital databases and paved the way for the contemporary Internet of Things, the idea to connect all devices to the web. They were highly controversial at points, protested by consumer groups and labor unions, and used as a symbol of dystopian capitalism and surveillance in science fiction and art installations. This book tells the story of the barcode's complicated history and examines how an object so crucial to so many parts of our lives became more ignored and more ordinary as it spread throughout the world.Object Lessons is published in partnership with an essay series in The Atlantic.
In the developmental psychology one could see that the person grows from one stage to another stage step by step. This gradual process of human being is a natural aspect where the growth either leads either positive development or negative regression. From childhood to old age there are various stages where a person grows and develops his physical, mental and psychological facet of life. In these stages the adolescent stage is very interesting and golden stage in one's life. This stage is also known as "Teenage" where a boy or girl passes through a transition period from childhood. This progress is very unique as it is creating a certain level of maturity in one's physical and mental development.A boy or girl who has been in the protection of parents a child has move from restriction and control to freedom and autonomy. This peculiar and unique period has created false understanding among the parents that the children may be misled or they may take a negative path. This over cautious attitude of parents has led the children to get angry or a negative behaviour towards the parents. So there is a tug war going on between the teenager and the parents. In a way the parents are over protective towards their children so that the teenager feels that they still treated as children and the teenager is unable to enjoy the freedom and autonomy.Since such false understating and a tug of war in other words a hide and seek between these two groups continue to exist where the question arises who is right and who is wrong. At the same time who fails in his/her role as parents as well as a teenager. This problem of misunderstanding and role failure has created in me a researcher to find out where the problem is and who creates the problem and if at all there comes up a problem then who needs to be intervened is all about my study.By doing this research we are clear where this over protective parents who just created a wonder and curiosity, on the other hand the Teenager who misunderstood their parents started playing the hide and seek.Having my own personal interest and personal inquisitiveness I have completed this research work with the help of teenagers themselves. I hope this would be a guide in directing the teenagers and their parents.
Consensus is the problem of making distributed nodes reach agreement. It is a basic building block that can be used in more complex distributed data management systems while retaining correctness guarantees of the state of the data and its recovery. Solving the intricacies of distributed coordination, network uncertainties, and failures in such complex data management problems is a daunting challenge. This has led many systems designers to utilize consensus as a tool to build more complex distributed protocols. Consensus has thus influenced data management systems and research for many decades. This monograph provides a foundation for the reader to understand the use of consensus protocols in data management systems and aims to empower data management researchers and practitioners to pursue work that utilizes and innovates consensus for their data management applications. It presents the foundations of consensus and consensus in data management by pointing out work that has been influential or representative of the data management areas the authors explore. They start with an introduction to the principles of consensus and then present background on the use of consensus in data management. They show how consensus is used for the distributed atomic commit problem and how it is used in replication protocols where data copies are distributed across different nodes. They further expand the scope of the crash-tolerant commit protocols to handle arbitrary failures by exploring the seminal fault-tolerant consensus protocol known as Practical Byzantine Fault Tolerance (Pbft). For each data management problem, the authors present a basic solution and highlight its shortcomings that invites the utilization of consensus. They then demonstrate the integration of consensus to overcome these shortcomings and provide desired design features, providing examples of each type of integration of consensus as well as an analysis of the integration and its implications. The monograph concludes with a summary and a discussion of future directions.
Social media's penetration was visible as most of the youth got attracted to forums like Facebook, Twitter, Instagram, Orkut, WhatsApp, etc. However, it was too early to assess the impact of social media on society. The mainstream media like print, television, and radio have always been a powerful tool of the politicians in promoting themselves and their political parties. During any election time, different forms of media are used by politicians for their campaigns and propaganda. The same can be witnessed now with social media. The Arab Spring phenomena and the election results in many developed countries of the world including the US were significant to understand the role of social media in the future for all countries of the world. While the UPA government was ruling under the leadership of Prime Minister .
This comprehensive guide to digital transformation and cloud computing covers everything you need to know to shift to the cloud confidently. The book explores the enabling technologies of digital transformation, including big data, artificial intelligence, and the Internet of Things. It then delves into the fundamental concepts of cloud computing, including its essential characteristics, service models, deployment models, and ecosystem. The guide also provides an in-depth look at sourcing cloud computing services, including cloud service brokerage, managed cloud services, and cloud migration tools. Finally, the book covers cloud operational excellence, with chapters on cloud target operating models, cloud operating models, cloud service management, and emerging roles and skills in cloud computing. This is an essential read for anyone involved in IT management, CIOs, senior IT engineers, and program managers in government, DoD, and commercial sectors who want to stay ahead in the digital age.
Behavior-based authentication is a relatively new approach that has gained traction in recent years for protecting system services from malicious attacks. This book, authored by K. Muthumanickam, is a comprehensive guide to this technique, detailing its applications, benefits, and limitations. The book covers various aspects of behavior-based authentication, including the concept of user behavior analysis, machine learning algorithms for detecting anomalous behavior, and the design and implementation of behavior-based authentication systems.The book provides a deep understanding of how behavior-based authentication works and how it can be effectively used to secure system services against attacks. It also includes case studies and examples that demonstrate the practical application of behavior-based authentication in real-world scenarios. This book is a valuable resource for cybersecurity professionals, system administrators, and anyone interested in understanding the latest techniques for protecting system services from malicious attacks.If you are looking to improve the security of your system services, this book is an excellent starting point. With its clear and concise explanations of behavior-based authentication, it is an essential guide for anyone looking to stay ahead of the curve in the rapidly evolving field of cybersecurity.
The development and promotion of teaching-enhanced learning tools in the academic field is leading to the collection of a large amount of data generated from the usual activity of students and teachers. The analysis of these data is an opportunity to improve many aspects of the learning process: recommendations of activities, dropout prediction, performance and knowledge analysis, resource optimization, etc. However, these improvements would not be possible without the application of computer science techniques that have demonstrated high effectiveness for this purpose: data mining, big data, machine learning, deep learning, collaborative filtering, and recommender systems, among other fields related to intelligent systems. This Special Issue provides 17 papers that show advances in the analysis, prediction, and recommendation of applications propelled by artificial intelligence, big data, and machine learning in the teaching-enhanced learning context.
dual model corresponding to given primal problems and some duality results werepiled up in Section 1.4. In Section 1.5, we recall standard minimax programmingproblem and present a small overview on the same. In Section 1.6, we introduce ashort note on saddle point optimality problems. In Section 1.7, we present basic conceptof multiobjective optimization problems and its solutions. Section 1.8 recallsconstraint qualification in multiobjective optimization problems. In Section 1.9,scalar and multiobjective semi-infinite optimization problems is introduced. In Section1.10, we remind definitions of Lipschitz and locally Lipschitz continuity. Section1.11 presents definition, basic properties of convexificators and recalls generalizedconvexity in terms of convexificators. Sections 1.12 is all about brief literature onsemidefinite programming problem and related concepts for further use. Section1.13 presents short introduction on vector variational inequality. Finally, Section1.14 includes basic details of mathematical programming with vanishing constraintsand its literature.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.