Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
The recent surge of interest in AI systems has raised concerns in moral quarters about their ethical use and whether they can demonstrate fair decision taking processes. Issues of unfairness and discrimination are pervasive when decisions are being made by humans, and are potentially amplified when decisions are made using machines with little transparency, accountability, and fairness. In this monograph, the authors introduce a framework for causal fairness analysis to understand, model, and possibly solve issues of fairness in AI decision-making settings. The authors link the quantification of the disparities present in the observed data with the underlying, often unobserved, collection of causal mechanisms that generate the disparity in the first place, a challenge they call the Fundamental Problem of Causal Fairness Analysis (FPCFA). In order to solve the FPCFA, they study the mapping variations and empirical measures of fairness to structural mechanisms and different units of the population, culminating in the Fairness Map.This monograph presents the first systematic attempt to organize and explain the relationship between various criteria in fairness and studies which causal assumptions are needed for performing causal fairness analysis. The resulting Fairness Cookbook allows anyone to assess the existence of disparate impact and disparate treatment. It is a timely and important introduction to developing future AI systems incorporating inherent fairness and as such will be of wide interest not only to AI system designers, but all who are interested in the wider impact AI will have on society.
This text contains a comprehensive reference for many commonly seen mathematical notations used frequently in Computer Science, including symbols (or other relevant notation), names, meanings, and programming equivalents (in Python, if any), alongside the most frequently used alphabets (i.e., Latin and Greek) and Latin abbreviations and phrases commonly used in academic literature.
Stay prepared for the next wave of technological innovation with VR and AR¿DESCRIPTION Virtual and extended reality technologies have come a long way since their inception, and today, they are poised to change how we work, learn, and interact with the world. From gaming and entertainment to education, healthcare, and beyond, these technologies have the potential to revolutionize many aspects of our lives. Understand the advancement of VR hardware, then master immersive design principles and analyze the powerful role of AI in XR. Explore the frontiers of VR/AR applications, from revolutionizing healthcare with virtual surgery simulations to bringing history to life with interactive AR experiences. Learn the business landscape of VR/AR, perfect the ethical considerations, and gain a deep understanding of the technical workings behind these incredible technologies. With practical guidance on building VR apps in Unity and monetizing your creations.By the end of the book, readers will have a deep understanding of the potential benefits and risks of these technologies, as well as the knowledge and tools needed to build successful VR and AR applications that are both innovative and ethical.WHAT YOU WILL LEARN¿ Understand fundamentals of Immersive technologies like AR, VR, and XR.¿ In-depth understanding of the concepts of presence.¿ Understand the ethical considerations surrounding VR and AR.¿ How VR applications can be built with unity and the scope of monetization.WHO THIS BOOK IS FORThis book is for tech enthusiasts, educators, healthcare professionals, artists, and entrepreneurs alike, offering a captivating journey into the future of immersive technologies.
Attackers have to be only right once, but just one mistake will permanently undo them.Book DescriptionThe "Ultimate Cyberwarfare for Evasive Cyber Tactic" is an all-encompassing guide, meticulously unfolding across pivotal cybersecurity domains, providing a thorough overview of cyber warfare. The book begins by unraveling the tapestry of today's cyber landscape, exploring current threats, implementation strategies, and notable trends. From operational security triumphs to poignant case studies of failures, readers gain valuable insights through real-world case studies.The book delves into the force-multiplying potential of the Information Warfare component, exploring its role in offensive cyber operations. From deciphering programming languages, tools, and frameworks to practical insights on setting up your own malware lab, this book equips readers with hands-on knowledge. The subsequent chapters will immerse you in the world of proof-of-concept evasive malware and master the art of evasive adversarial tradecraft. Concluding with a forward-looking perspective, the book explores emerging threats and trends, making it an essential read for anyone passionate about understanding and navigating the complex terrain of cyber conflicts.Table of Contents1. History of Cyber Conflicts2. Notable Threats and Trends3. Operational Security Successes and Failures4. The Information Warfare Component5. Programming Languages, Tools, and Frameworks6. Setting Up Your Malware Lab7. Proof-of-Concept Evasive Malware8. Evasive Adversarial Tradecraft9. Emerging Threats and Trends Index
The scientific theme of the book is ¿Sustainability for the digital manufacturing erä which is focused on how the technological enablers of digital systems drive the sustainability for products, processes, manufacturing, and logistics systems in the industry of the future. The book¿s chapters describe sustainability drivers specific to the technological advances that motivate, encourage, and engage the economic, social, and environmental aspects within intelligent manufacturing and logistics systems. The novelty of this approach consists in extending the economic sustainability of digital manufacturing with the ethical perspective at human social scale. The general scope of the book is to foster innovation in smart and sustainable manufacturing and logistics systems and in this context to promote concepts, methods, and solutions for the digital transformation of manufacturing through service orientation in holonic and agent-based control with distributed intelligence. The book¿s readership is comprised of researchers and engineers working in the value chain of products and processes, who develop digital control solutions in the ¿Industry of the Future¿ vision. The book is also addressed to master¿s and Ph.D. students enrolled in Engineering Sciences programs.
Beginner or expert, professional or hobbyist, this is the Linux guide you need! Install Linux and walk through the basics: working in the terminal, handling files and directories, using Bash, and more. Then get into the nitty-gritty details of configuring your system and server, from compiling kernel modules to using tools like Apache, Postfix, and Samba. With information on backups, firewalls, virtualization, and more, you'll learn everything there is to know about Linux! Highlights include: 1) Installation 2) GNOME and KDE 3) Bash, Vim, Emacs 4) Network configuration 5) Software and package management 6) Administration 7) Kernel modules 8) Apache 9) Postfix and Dovecot 10) Samba 11) Security 12) Virtualization
The new SAP Build is here-dive into its tools for low-code and no-code development! Looking for a new development environment to create full stack applications? Learn how to implement SAP Build Apps! Need better tools to design and build a central access point-like SAP Fiori launchpad-for business applications? Get SAP Build Work Zone up and running! Want to create, maintain, and automate business processes? Look no further than SAP Build Process Automation! With practical guidance on the whole SAP Build suite, you'll be developing in no time. Highlights include: 1) SAP Build Apps 2) SAP Build Work Zone 3) SAP Build Process Automation 4) SAP Cloud Transport Management 5) Low-code/no-code (LCNC) 6) Application development 7) Visual cloud functions 8) UI integration 9) Process development 10) Rules, decisions, and actions 11) Automation 12) Administration
Are you ready to move to Amazon's public cloud? Find all the information you need to deploy SAP on AWS in this guide! Learn how to design a system that meets your business needs with the AWS Well-Architected Framework. Then, prepare for your migration by reviewing AWS-approved methodologies, approaches, and tools. Finally, you'll see what daily operations look like on AWS, and get tips for multicloud strategies and SAP workload transformations. Your cloud journey starts here! Highlights include: 1) Cloud deployment 2) AWS Well-Architected Framework 3) Landing zones 4) Architecture 5) Migration 6) Operations 7) Automation 8) Multicloud configuration 9) Transformation 10) Cloud-native services
Whether you're moving to the cloud, migrating to SAP S/4HANA, or replacing a legacy system, get the data migration guidance you need in this comprehensive guide. Evaluate your landscape options and plan your strategy; then walk through the migration processes for SAP S/4HANA, SAP SuccessFactors, SAP Ariba, and SAP Business ByDesign. Master built-in tools and templates, IDoc and ALE distribution models, batch input, Cloud Integration from SAP Integration Suite, and more! Highlights include: 1) Planning 2) SAP S/4HANA 3) SAP S/4HANA Cloud 4) SAP SuccessFactors 5) SAP Ariba 6) SAP Business ByDesign 7) SAP Legacy System Migration Workbench 8) SAP S/4HANA migration cockpit 9) Cloud Integration 10) SAP S/4HANA migration object modeler 11) Batch input 12) IDoc and ALE distribution models
This book provides an in-depth discussion of the theoretical and practical issues of criminal imputation for negligence crime involving artificial intelligence. Accordingly, this study combines the imputation challenges brought about by AI with traditional criminal imputation theory and analyses imputation for negligence crime involving AI from three aspects: the basic principles, structure, and results of imputation for negligence crime involving AI. The traditional theory of imputation is discussed in detail. The readership is a group of people interested in this topic, including, in particular, interested laymen, undergraduate students and postgraduate researchers. The highlights of this book are it identifies the imputation challenges bought about by AI, reveals the theoretical and practical gap in the criminal imputation of negligent crimes involving AI, and provides an in-depth and creative ideas of criminal imputation for the negligent crimes involving AI.
Content distribution, i.e., distributing digital content from one node to another node or multiple nodes, is the most fundamental function of the Internet. Since Amazon's launch of EC2 in 2006 and Apple's release of the iPhone in 2007, Internet content distribution has shown a strong trend toward polarization. On the one hand, considerable investments have been made in creating heavyweight, integrated data centers ("heavy-cloud") all over the world, in order to achieve economies of scale and high flexibility/efficiency of content distribution. On the other hand, end-user devices ("light-end") have become increasingly lightweight, mobile and heterogeneous, creating new demands concerning traffic usage, energy consumption, bandwidth, latency, reliability, and/or the security of content distribution. Based on comprehensive real-world measurements at scale, we observe that existing content distribution techniques often perform poorly under the abovementioned new circumstances.Motivated by the trend of "heavy-cloud vs. light-end," this book is dedicated to uncovering the root causes of today's mobile networking problems and designing innovative cloud-based solutions to practically address such problems. Our work has produced not only academic papers published in prestigious conference proceedings like SIGCOMM, NSDI, MobiCom and MobiSys, but also concrete effects on industrial systems such as Xiaomi Mobile, MIUI OS, Tencent App Store, Baidu PhoneGuard, and WiFi.com. A series of practical takeaways and easy-to-follow testimonials are provided to researchers and practitioners working in mobile networking and cloud computing. In addition, we have released as much code and data used in our research as possible to benefit the community.
This book highlights the basic theories and technical principles of the synthetic aperture radar (SAR), aiming to bridge theories and applications for readers. Supported by the practical experience of the author's dedicated research, this book also constructs the SAR theoretical system from multiple perspectives.The synthetic aperture radar (SAR) is a weather-independent microwave remote sensing device that involves a number of multidisciplinary fields such as signal processing and image information processing. Written by experts in remote sensing and signal processing, the book explains the signal echo modeling, imaging principles and algorithms, image quality control methods, and image applications. Readers are provided with concise descriptions of commonly used imaging algorithms for SAR in multiple regimes, modes, and applications, including the Range Doppler Algorithm (RDA) and the Frequency Scaling Algorithm (FSA). Continuous wave/pulse regime SAR technology, inverse synthetic aperture radar (ISAR) technology, digital beam forming (DBF), interferometry, and moving target detection methods are discussed in detail.The book is a must-read and comprehensive reference for researchers and engineers engaged in the R&D of the SAR and for graduate students interested in the field.
This edited volume presents perspectives from computer science, information theory, neuroscience and brain imaging, aesthetics, social sciences, psychiatry, and philosophy to answer frontier questions related to artificial intelligence and human experience. Can a machine think, believe, aspire and be purposeful as a human? What is the place in the machine world for hope, meaning and transformative enlightenment that inspires human existence? How, or are, the minds of machines different from that of humans and other species? These questions are responded to along with questions in the intersection of health, intelligence and the brain. It highlights the place of consciousness by attempting to respond to questions with the help of fundamental reflections on human existence, its life-purposes and machine intelligence. The volume is a must-read for interdisciplinary and multidisciplinary researchers in humanities and social sciences and philosophy of science who wish to understand the future of AI and society.
The book ¿Applied Assistive Technologies and Informatics for Students with Disabilities¿ provides a comprehensive guide to assist students with learning disabilities in higher education via modern assistive technologies and informatics. This book will take us on a tour of the various modern assistive technologies, such as artificial intelligence (AI), blockchain, computer vision (CV), text analytics (TA), the metaverse, human-computer interaction (HCI), digital twins (DT), and federated learning (FL), and how they support higher education students with learning disabilities.This book is intended for students with learning disabilities, scientists and researchers, lecturers and teachers, academic and corporate libraries, practitioners, and professionals who are interested in providing inclusive education to students with learning disabilities through the application of modern assistive technologies and informatics. This book is ideal for readers who are new to the subject and knowledgeable about the principles of inclusive education. In addition, it is a fantastic resource for teachers and parents assisting students with learning disabilities. This book can be a powerful tool to educate more students about learning disabilities, which can help eradicate the bullying of these students.
The book includes a thorough examination of the many types of algorithms for recommender systems, as well as a comparative analysis of them. It addresses the problem of dealing with the large amounts of data generated by the recommender system. The book also includes two case studies on recommender system applications in healthcare monitoring and military surveillance. It demonstrates how to create attack-resistant and trust-centric recommender systems for sensitive data applications. This book provides a solid foundation for designing recommender systems for use in healthcare and defense.
Each of the "Keys to the Kingdom" Advanced Training Course Manuals will further a Seekers reach on the Pathway leading out of this Universe.
Analyze system crashes and freezes, navigate kernel and complete memory spaces, and diagnose patterns of abnormal software behavior using the WinDbg debugger.
Analyze crashes and freezes, navigate through user space and diagnose heap corruption, memory and handle leaks, CPU spikes, blocked threads, deadlocks, wait chains, and more using WinDbg debugger.
"A thoroughly updated and revised edition of a university president's recommendations for providing the next generation of college students with the critical skills needed to work with, and alongside, AI"--
Fusion: Blending disciplines for deeper understandingFusion is the process of blending two or more different disciplines. It is a creative process that can be used to create something new and different. Fusion can help to promote dialogue between different ideas, perspectives, or cultures.The need for fusionThe world is changing rapidly. New technologies, ideas, and cultures are constantly emerging. In order to understand and effectively respond to these changes, we need to learn how to blend different disciplines.Fusion can help us to create new understandings. It allows us to identify the connections between two different things and use them in new ways.Examples of fusionFusion is used in many fields. Here are a few examples:· Technology: Fusion is used to develop new technologies. For example, solar fusion is a new method for generating solar energy more efficiently.· Education: Fusion is used to help students understand the connections between different subjects. For example, fusion between science and the arts can help students to think creatively and solve problems.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.