Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
This book covers latest advancements in the areas of machine learning, computer vision, pattern recognition, computational learning theory, big data analytics, network intelligence, signal processing and their applications in real world. The topics covered in machine learning involves feature extraction, variants of support vector machine (SVM), extreme learning machine (ELM), artificial neural network (ANN) and other areas in machine learning. The mathematical analysis of computer vision and pattern recognition involves the use of geometric techniques, scene understanding and modelling from video, 3D object recognition, localization and tracking, medical image analysis and so on. Computational learning theory involves different kinds of learning like incremental, online, reinforcement, manifold, multi-task, semi-supervised, etc. Further, it covers the real-time challenges involved while processing big data analytics and stream processing with the integration of smart data computing services and interconnectivity. Additionally, it covers the recent developments to network intelligence for analyzing the network information and thereby adapting the algorithms dynamically to improve the efficiency. In the last, it includes the progress in signal processing to process the normal and abnormal categories of real-world signals, for instance signals generated from IoT devices, smart systems, speech, videos, etc., and involves biomedical signal processing: electrocardiogram (ECG), electroencephalogram (EEG), magnetoencephalography (MEG) and electromyogram (EMG).
This book gives a detailed overview of a universal Maximum Likelihood (ML) decoding technique, known as Guessing Random Additive Noise Decoding (GRAND), has been introduced for short-length and high-rate linear block codes. The interest in short channel codes and the corresponding ML decoding algorithms has recently been reignited in both industry and academia due to emergence of applications with strict reliability and ultra-low latency requirements . A few of these applications include Machine-to-Machine (M2M) communication, augmented and virtual Reality, Intelligent Transportation Systems (ITS), the Internet of Things (IoTs), and Ultra-Reliable and Low Latency Communications (URLLC), which is an important use case for the 5G-NR standard.GRAND features both soft-input and hard-input variants. Moreover, there are traditional GRAND variants that can be used with any communication channel, and specialized GRAND variants that are developed for a specific communication channel. This book presents a detailed overview of these GRAND variants and their hardware architectures.The book is structured into four parts. Part 1 introduces linear block codes and the GRAND algorithm. Part 2 discusses the hardware architecture for traditional GRAND variants that can be applied to any underlying communication channel. Part 3 describes the hardware architectures for specialized GRAND variants developed for specific communication channels. Lastly, Part 4 provides an overview of recently proposed GRAND variants and their unique applications.This book is ideal for researchers or engineers looking to implement high-throughput and energy-efficient hardware for GRAND, as well as seasoned academics and graduate students interested in the topic of VLSI hardware architectures. Additionally, it can serve as reading material in graduate courses covering modern error correcting codes and Maximum Likelihood decoding for short codes.
This book constitutes the refereed deadline proceedings of the 28th International Conference on Graph-Based Representation and Reasoning, ICCS 2023, held in Berlin, Germany, during September 11¿13, 2023.The 9 full papers, 5 short papers and 4 Posters are included in this book were carefully reviewed and selected from 32 submissions. They were organized in topical sections as follows: Complexity and Database Theory, Formal Concept Analysis: Theoretical Advances, Formal Concept Analysis: Applications, Modelling and Explanation, Semantic Web and Graphs, Posters.
Die Übersetzung der sechsten Auflage des Standardwerks zur Rechnerorganisation »Computer Organization and Design« bietet dem Leser neue Beispiele, Übungsaufgaben sowie Stoff über mobiles Computing und die Cloud. Die Inhalte wurden verbessert und mit der Vorstellung neuer Prozessoren aktualisiert. Das sechste Kapitel wurde um einen Abschnitt über domänenspezifische Architekturen erweitert, ein neuer Ansatz, der am Beispiel von Googles Tensor Processing Unit (TPU) ausführlich dargestellt wird. Abschnitte zur Beschleunigung demonstrieren am Beispiel der Matrixmultiplikation verschiedene Optimierungsschritte, die wichtige Architekturprinzipien ausnutzen. Sieben bedeutende Konzepte der Computerarchitektur werden eingeführt und diskutiert: Performanz durch Parallelität, Performanz durch Pipelining, Performanz durch Vorhersagen, Speicherhierarchien, Abstraktion zur Vereinfachung des Designs, das Beschleunigen des häufigen Falls und Zuverlässigkeit durch Redundanz. Wie bei den vorherigen Auflagen ist ein MIPS-Prozessor der Kern, der verwendet wird, um die Grundlagen von Hardwaretechnologien, Assemblersprache, Computerarithmetik, Pipelining, Speicherhierarchien und der Ein-/Ausgabe zu vermitteln.Z
This book constitutes the refereed proceedings of the 23rd International Conference on Innovations for Community Services, I4CS 2023, held in Bamberg, Germany, in September 2023.The 15 full papers and 4 short papers presented in this volume were carefully reviewed and selected from 38 submissions. One invited talk in full-paper length is included in the volume. The papers focus on topics such as distributed architectures and frameworks for community services, advanced applications regarding digital communities on the move, new trends of socialization covering the ambient work and living of digital societies.
Das Gebiet der heutigen Ukraine gehörte zu den zentralen Tatorten der deutschen Besatzungsverbrechen und des Holocaust. Im September 1941 richteten die Deutschen dort das Reichskommissariat Ukraine ein, das zum Zeitpunkt seiner größten Ausdehnung aus Teilen des damaligen Ostpolens sowie der Sowjetrepubliken Belarus und Ukraine bestand. Zur Jahreswende 1941/42 ließ das Reichssicherheitshauptamt dort auch stationäre Dienststellen der Kommandeure der Sicherheitspolizei und des SD aufbauen. Sie führten weitgehend die verbrecherische Tätigkeit der sogenannten Einsatzgruppen fort, die weiter nach Osten vorstießen. Doch mit einem Unterschied: Sie waren gekommen, um zu bleiben und die Dystopie eines deutsch-dominierten Osteuropas in die Praxis umzusetzen. In der Folge erschossen die Angehörigen dieser Dienststellen unzählige als Juden und Roma verfolgte Menschen und Kriegsgefangene, errichteten ein eigenes Lagersystem, verfolgten den Widerstand, richteten eine einheimische Kriminalpolizei ein und nahmen aktiv Einfluss auf die Kirchenpolitik. Die Studie untersucht erstmals die Geschichte und das Personal der Dienststellen im Reichskommissariat Ukraine und wirft damit auch neues Licht auf die Praxis der Besatzung und den Holocaust.
This book constitutes the revised selected papers of the 11th International Conference on Cloud Computing, Big Data & Emerging Topics, JCC-BD&ET 2023, held in La Plata, Argentina*, in June 2023.The 14 full papers were carefully reviewed and selected from a total of 38 submissions. The papers are organized in topical sections on: Parallel and Distributed Computing, Big Data, Machine and Deep Learning, Smart Cities and E-Government, Visualization.
This book reports on the latest advances from both industry and academia on ubiquitous intelligence and how it is enabled by 5G/6G communication technologies. The authors cover network protocol and architecture design, machine learning and artificial intelligence, coordinated control and digital twins technologies, and security and privacy enhancement for ubiquitous intelligence. The authors include recent studies of performance analysis and enhancement of the Internet of Things, cyber-physical systems, edge computing, and cyber twins, all of which provide importance guidance and theoretical tools for developing future ubiquitous intelligence. The content of the book will be of interest to students, educators, and researchers in academia, industry, and research laboratories.Provides comprehensive coverage of enabling communications, computing, and control technologies for ubiquitous intelligence;Presents a novel paradigm of ubiquitous intelligence powered by broadband communications, computing, and control;Includes a review of 5G/6G communication technologies, network protocol and architecture design, and ubiquitous computing.
This book constitutes the refereed proceedings of the 14th International Workshop on Post-Quantum Cryptography, PQCrypto 2022, held in College Park, MD, USA, in August 14¿18, 2023.The 25 full papers presented in this book were carefully reviewed and selected from 51 submissions. They are categorized in the following topical sections: code-based cryptography; group-action-based cryptography; isogenye-based cryptography; lattice-based cryptography; multivariate cryptography; quantum algorithms, cryptanalysis and models; post-quantum protocols; side channel cryptanalysis and countermeasures.
This book constitutes the proceedings of the 19th International Workshop on OpenMP, IWOMP 2023, held in Bristol, UK, during September 13¿15, 2023.The 15 full papers presented in this book were carefully reviewed and selected from 20 submissions. The papers are divided into the following topical sections: OpenMP and AI; Tasking Extensions; OpenMP Offload Experiences; Beyond Explicit GPU Support; and OpenMP Infrastructure and Evaluation.
This book uses digital radios as a challenging design example, generalized to bridge a typical gap between designers who work on algorithms and those who work to implement those algorithms on silicon. The author shows how such a complex system can be moved from high-level characterization to a form that is ready for hardware implementation. Along the way, readers learn a lot about how algorithm designers can benefit from knowing the hardware they target and how hardware designers can benefit from a familiarity with the algorithm. The book shows how a high-level description of an algorithm can be migrated to a fixed-point block diagram with a well-defined cycle accurate architecture and a fully documented controller. This can significantly reduce the length of the hardware design cycle and can improve its outcomes. Ultimately, the book presents an explicit design flow that bridges the gap between algorithm design and hardware design.Provides a guide to baseband radio design for Wi-Fi and cellular systems, from an implementation-focused, perspective;Explains how arithmetic is moved to hardware and what the cost of each operation is in terms of delay, area and power;Enables strategic architectural decisions based on the algorithm, available processing units and design requirements.
Dieses Open Buch schlägt eine Brücke zwischen Theorie und Praxis für das produzierende Gewerbe im Zeitalter der Digitalisierung, der Industrie 4.0 und der Künstlichen Intelligenz. Es ist das Resultat eines vierjährigen Forschungsprojekts, das unter der Leitung des Instituts für Produktionssysteme der Technischen Universität Dortmund und der RapidMiner GmbH in Zusammenarbeit mit zwölf weiteren Partnern durchgeführt wurde. Das Hauptziel des Projekts war die Entwicklung einer Datenanalyse-Plattform zur Förderung einer effektiven und kompetenzorientierten Zusammenarbeit in dynamischen Wertschöpfungsnetzwerken.Die zwanzig Beiträge in diesem Sammelband liefern umfassende Einblicke in die Forschungsergebnisse und schildern die gemeinsamen Erfahrungen der Partner aus produzierenden Unternehmen, Software- und Hardware-Anbietern sowie Forschungseinrichtungen. Im Fokus steht die Entwicklung von Lösungen, die in einem modularen Referenzbaukasten zusammengefasst sind. Dieser Baukasten unterstützt industrielle Datenanalysen und deren Integration in betriebliche Abläufe. Er fördert darüber hinaus eine kompetenzorientierte Zusammenarbeit und ermöglicht somit die Initiierung neuer Geschäftsmodelle und Kollaborationen.Das Buch richtet sich an Praktiker:innen aus der Industrie ebenso wie an Wissenschaftler:innen. Es liefert Impulse und bietet Hilfestellungen, um den Herausforderungen der digitalen Transformation zu begegnen und die Zukunft der industriellen Datenanalyse erfolgreich zu gestalten.
This book contains a selection of the best papers of the 34th Benelux Conference on Artificial Intelligence, BNAIC/ BENELEARN 2022, held in Mechelen, Belgium, in November 2022.The 11 papers presented in this volume were carefully reviewed and selected from 134 regular submissions. They address various aspects of artificial intelligence such as natural language processing, agent technology, game theory, problem solving, machine learning, human-agent interaction, AI and education, and data analysis.
This two-volume set LNAI 13995 and LNAI 13996 constitutes the refereed proceedings of the 15th Asian Conference on Intelligent Information and Database Systems, ACIIDS 2023, held in Phuket, Thailand, during July 24-26, 2023.The 65 full papers presented in these proceedings were carefully reviewed and selected from 224 submissions. The papers of the 2 volume-set are organized in the following topical sections: Case-Based Reasoning and Machine Comprehension; Computer Vision; Data Mining and Machine Learning; Knowledge Integration and Analysis; Speech and Text Processing; and Resource Management and Optimization.
"Kyiv, 1919. World War I has ended in Western Europe, but to the East, six factions continue to vie for control of Ukraine. Amidst the political turmoil, young Samson Kolechko is forced to place his engineering career on hold. But in the city of Kyiv everything remains up for grabs and new opportunity lurks just around the corner. When two Red Army soldiers commandeer his home, Samson's life is completely upended. But as Samson juggles his personal life -including a budding romance with the ingenious Nadezhda, a statistician helping run the city's census- with the soldiers' intrusion, he winds up overhearing their secret plans. Deciding to report them, Samson instead finds himself unwittingly recruited as an investigator for the city's new police force. His first case involves two murders, a long bone made of pure silver, and a suit of decidedly unusual proportions tailored from fine English cloth. The odds stacked against him, Samson turns to Nadezhda, who proves to be more than his match."--Provided by publisher.
This book presents the proceedings of the 5th International Conference on Wireless Intelligent and Distributed Environment for Communication (WIDECOM 2022), which took place at the University of Windsor, Windsor, Canada, October 12-14, 2022. The book addresses issues related to new dependability paradigms, design, and performance of dependable network computing and mobile systems, as well as issues related to the security of these systems. The goal of the conference is to provide a forum for researchers, students, scientists and engineers working in academia and industry to share their experiences, new ideas and research results in the above-mentioned areas.
This book constitutes selected papers presented at the First International Conference on Artificial Intelligence and Internet of Things, ICAII 2022, held in Jamshedpur, India. ICAII 2022 has been postponed to April 2023. The 23 papers were thoroughly reviewed and selected from the 86 submissions. They are arranged in topical sections on ¿artificial Intelligence, and Internet of Things.
This book is a collection of chapters from the IFIP working groups 13.8 and 9.4. The 10 papers included present experiences and research on the topic of digital transformation and innovation practices in the global south. The topics span from digital transformation initiatives to novel innovative technological developments, practices and applications of marginalised people in the global south.
Western academics, experts, and journalists specializing in Eastern Europe, Russia and Eurasia have grappled with two fundamental analytical crises in connection with the 1991 disintegration of the USSR and Russiäs 2014 invasion of Ukraine. Both crises were brought about by a similar lack of understanding of Moscow¿s inability to view its neighbors, in particular Ukraine, as not possessing sovereignty and not treating them as independent states. Typically, they downplayed the historic and current role of Russian imperialism and nationalism.The book¿s contributors investigate how the Kremlin¿s recent turbo-charging of Russiäs information warfare, 24-hour TV, and social media activity has expanded on traditional pro-Russian sentiments among Western academics, experts, and journalists. The authors analyze the downplaying of Russian nationalism, misinterpretations of the 2014 crisis, sympathetic portrayals of Crimeäs occupation, and the use of the term ¿civil war¿ rather than ¿Russian-Ukrainian war¿ for the Donbas conflict in academia as well as the think tank world and media in the UK, Germany, Poland, Czech Republic, Japan, USA, and Canada.
This book constitutes the refereed proceedings of the 18th International Symposium on Algorithms and Data Structures, WADS 2023, held during July 31-August 2, 2023. The 47 regular papers, presented in this book, were carefully reviewed and selected from a total of 92 submissions. They present original research on the theory, design and application of algorithms and data structures.
Programming can feel daunting at times, and it is especially intimidating to beginners, but with the invention of the Raspberry Pi, it became much easier to learn and more affordable. The Pi is a tiny credit card-sized computer that led to the appearance of an entirely new community of geeks. With this straightforward, easy to follow guide, aspiring programmers can now learn the craft without feeling overwhelmed and develop cool gadgets and complex robots.The Raspberry Pi has sold millions of units since its arrival on the market, and this Comprehensive Beginner's Guide to Setup, Programming (Concepts and Techniques) and Developing Cool Raspberry Pi Projects will show you why! Here's what you will gain by reading this beginner-friendly book:Set up your very own Raspberry Pi and learn how to connect other devices to it.Learn how to work with Linux and use basic commands.Enter the world of Programming with Python, a powerful language with world-wide renown for being easy to learn, but highly versatile.Grasp the more advanced concepts of object-oriented programming.Explore the process of creating cool projects, from the humble web crawler to the mighty weather station.Open your mind to an entire world of possibilities. After all, it's easy as pie!
This book constitutes the proceedings of the 17th IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance, HAISA 2023, held in Kent, United Kingdom, in July 2023. The 37 full papers presented in this volume were carefully reviewed and selected from 54 submissions. They are organized in the following topical sections: education and training; management, policy and skills; evolving threats and attacks; social-technical factors; and research methods.
This book demonstrates that the reliable and secure communication performance of maritime communications can be significantly improved by using intelligent reflecting surface (IRS) aided communication, privacy-aware Internet of Things (IoT) communications, intelligent resource management and location privacy protection. In the IRS aided maritime communication system, the reflecting elements of IRS can be intelligently controlled to change the phase of signal, and finally enhance the received signal strength of maritime ships (or sensors) or jam maritime eavesdroppers illustrated in this book.The power and spectrum resource in maritime communications can be jointly optimized to guarantee the quality of service (i.e., security and reliability requirements), and reinforcement leaning is adopted to smartly choose the resource allocation strategy. Moreover, learning based privacy-aware offloading and location privacy protection are proposed to intelligently guarantee the privacy-preserving requirements of maritime ships or (sensors). Therefore, these communication schemes based on reinforcement learning algorithms can help maritime communication systems to improve the information security, especially in dynamic and complex maritime environments.This timely book also provides broad coverage of the maritime wireless communication issues, such as reliability, security, resource management, and privacy protection. Reinforcement learning based methods are applied to solve these issues. This book includes four rigorously refereed chapters from prominent international researchers working in this subject area. The material serves as a useful reference for researchers, graduate students. Practitioners seeking solutions to maritime wireless communication and security related issues will benefit from this book as well.
This book provides an introduction to the key concepts of Fully Homomorphic Encryption (FHE)-based computing, and discusses the challenges associated with architecting FHE-based computing systems. Readers will see that due to FHE¿s ability to compute on encrypted data, it is a promising solution to address privacy concerns arising from cloud-based services commonly used for a variety of applications including healthcare, financial, transportation, and weather forecasting. This book explains the fundamentals of the FHE operations and then presents an architectural analysis of the FHE-based computing. The authors also highlight challenges associated with accelerating FHE on various commodity platforms and argue that the FPGA platform provides a sweet spot in making privacy-preserving computing plausible.
This book constitutes the refereed post proceedings of the 17th International Conference on Parallel Computational Technologies, PCT 2023, held in Saint Petersburg, Russia, during March 28¿30, 2023.The 25 full papers included in this book were carefully reviewed and selected from 71 submissions. They were organized in topical sections as follows: "High Performance Architectures, Tools and Technologies", "Parallel Numerical Algorithms", and "Supercomputer Simulation".
The war in Ukraine did not start on 24 February 2022. It began eight years earlier in eastern Ukraine¿s Donbas region. In his new book, Jakob Hauter investigates the escalation of violence in the spring and summer of 2014. He demonstrates that, contrary to popular belief, the pre-2022 conflict was not a civil war. Ukraine has been fighting a Russian invasion since the armed conflict¿s very beginning. Hauter arrives at this conclusion based on a thorough review of the digital open source information (DOSI) available on the Internet. He argues that social science research needs theoretical and methodological innovation to operate in the abundant but murky information environment surrounding the Donbas War and other conflicts of the social media age. To address this challenge, he develops an escalation sequence model which divides the formative phase of the Donbas War into six critical junctures. He then combines the social science methodology of process tracing with DOSI analysis to investigate the causes of these critical junctures. For each juncture, Hauter assesses the available evidence of domestic causes and Russian interference, reaching the conclusion that, in most cases, there is convincing evidence that Russian involvement was the primary cause of armed escalation.¿This excellent, meticulously researched book is important. Not only does it provide fresh insights based on forensic analysis into the escalation of violence in Ukraine¿s Donbas region in 2014, it breaks new methodological ground: It shows how process tracing and the use of digital open source information can be combined in a rigorous way to deal with the informational challenges associated with conflict. Russiäs Overlooked Invasion brings much-needed transparency to an opaque but vital subject.¿¿Ben Noble, Associate Professor of Russian Politics, UCL SSEES¿Most previous accounts of the war in Eastern Ukraine have not gone beyond generalities. Hauter uses open source Intelligence for a forensic analysis, breaking down the events leading to war into six critical junctures, in four of which Russia is shown to have been the primary actor. Without Russia, moreover, there would have been no necessary progression through the six phases, and a containable conflict would not have become a hot war.¿¿Andrew Wilson, Professor of Ukrainian Studies, UCL SSEES
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.