- Table View
- List View
Cybernetics, Cognition and Machine Learning Applications: Proceedings of ICCCMLA 2021 (Algorithms for Intelligent Systems)
by Vinit Kumar Gunjan P. N. Suganthan Jan Haase Amit KumarThis book includes the original, peer-reviewed research articles from the 3rd International Conference on Cybernetics, Cognition and Machine Learning Applications (ICCCMLA 2021), held in August 21 – 22, 2021, at Goa, India. It covers the latest research trends or developments in areas of data science, artificial intelligence, neural networks, cognitive science and machine learning applications, cyber physical systems and cybernetics.
Cybernetics, Cognition and Machine Learning Applications: Proceedings of ICCCMLA 2019 (Algorithms for Intelligent Systems)
by Amit Kumar Vinit Kumar Gunjan Jan Haase Balasubramanian Raman P. N. SuganthanThis book provides a collection of selected papers presented at the International Conference on Cybernetics, Cognition and Machine Learning Applications (ICCCMLA 2019), which was held in Goa, India, on 16–17 August 2019. It covers the latest research trends and advances in the areas of data science, artificial intelligence, neural networks, cognitive science and machine learning applications, cyber-physical systems, and cybernetics.
Cybernetics in C++ (River Publishers Series In Software Engineering Ser.)
by Avi BhattacharyyaC++ is a powerful, much sought after programming language, but can be daunting to work with, even for engineering professionals. Why is this book so useful? Have you ever wondered:- How do keywords like static and virtual change their meanings according to context?- What are the similarities and differences between Pointers and References, Pointers and Arrays, Constructors and Copy Constructors, Nested and Local Inner Classes?- Why is Multiple Interface Inheritance seen to be beautiful but Multiple Implementation Inheritance considered evil?- When is Polymorphism Static or Dynamic, Bounded or Unbounded?Answers on these questions, and much more, are explained in this book, Cybernetics in C++. What makes this text so different and appealing in comparison to existing books on the market?- The Bulleted style, as opposed to Prose, produces results much faster, both in learning and reference- Rules of Thumb, and further expert Tips are given throughout in how to optimise your code- The Prospective Evils sections tell you what to avoid- The thorough coverage ensures you will be trained to expert level in each of Imperative, Procedural, Memory & Resource Management, Object Oriented and Generic ProgrammingCybernetics in C++ combines a theoretical overview and practical approach in one book, which should prove to be a useful reference for computer scientists, software programmers, engineers and students in this and related field.
The Cybernetics Moment: Or Why We Call Our Age the Information Age (New Studies in American Intellectual and Cultural History)
by Ronald R. KlineHow did cybernetics and information theory arise, and how did they come to dominate fields as diverse as engineering, biology, and the social sciences?Winner of the CHOICE Outstanding Academic Title of the Choice ACRLOutstanding Academic Title, ChoiceCybernetics—the science of communication and control as it applies to machines and to humans—originates from efforts during World War II to build automatic antiaircraft systems. Following the war, this science extended beyond military needs to examine all systems that rely on information and feedback, from the level of the cell to that of society. In The Cybernetics Moment, Ronald R. Kline, a senior historian of technology, examines the intellectual and cultural history of cybernetics and information theory, whose language of "information," "feedback," and "control" transformed the idiom of the sciences, hastened the development of information technologies, and laid the conceptual foundation for what we now call the Information Age. Kline argues that, for about twenty years after 1950, the growth of cybernetics and information theory and ever-more-powerful computers produced a utopian information narrative—an enthusiasm for information science that influenced natural scientists, social scientists, engineers, humanists, policymakers, public intellectuals, and journalists, all of whom struggled to come to grips with new relationships between humans and intelligent machines.Kline traces the relationship between the invention of computers and communication systems and the rise, decline, and transformation of cybernetics by analyzing the lives and work of such notables as Norbert Wiener, Claude Shannon, Warren McCulloch, Margaret Mead, Gregory Bateson, and Herbert Simon. Ultimately, he reveals the crucial role played by the cybernetics moment—when cybernetics and information theory were seen as universal sciences—in setting the stage for our current preoccupation with information technologies.
Cybernetics of Art: Reason and the Rainbow (Routledge Revivals)
by M. J. RosenbergFirst published in 1983, Cybernetics of Art uses the methodology and concepts of cybernetics to explore art and the creative process. Part I surveys the domain that includes both science and the arts, attempting to understand their differing viewpoints- and the basis of conflicts between them. Art is approached as a method of knowledge aimed at knowledge of experience per se (as distinct from knowledge derived through experience).Part II poses the problem of notionally constructing an authorship machine and develops the technical argument by exploring the question of the kind of machine it would need to be. Part III examines the products of such a machine with a view to finding criteria for distinguishing those that might be called art. An extended, non-technical commentary accompanies the text throughout, with the dual aim of comparing the book’s technical conclusions with ideas expressed by critiques and practicing artists and assisting readers unfamiliar with the information sciences in following the argument. In a world dominated by artificial intelligence, this interdisciplinary book will be useful for scholars and researchers of cybernetics, art, and humanities and social sciences in general.
Cybernetics or Control and Communication in the Animal and the Machine, Reissue of the 1961 second edition: Or Control And Communication In The Animal And The Machine (The\mit Press Ser.)
by Norbert WienerA classic and influential work that laid the theoretical foundations for information theory and a timely text for contemporary informations theorists and practitioners.With the influential book Cybernetics, first published in 1948, Norbert Wiener laid the theoretical foundations for the multidisciplinary field of cybernetics, the study of controlling the flow of information in systems with feedback loops, be they biological, mechanical, cognitive, or social. At the core of Wiener's theory is the message (information), sent and responded to (feedback); the functionality of a machine, organism, or society depends on the quality of messages. Information corrupted by noise prevents homeostasis, or equilibrium. And yet Cybernetics is as philosophical as it is technical, with the first chapter devoted to Newtonian and Bergsonian time and the philosophical mixed with the technical throughout. This book brings the 1961 second edition back into print, with new forewords by Doug Hill and Sanjoy Mitter. Contemporary readers of Cybernetics will marvel at Wiener's prescience—his warnings against “noise,” his disdain for “hucksters” and “gadget worshipers,” and his view of the mass media as the single greatest anti-homeostatic force in society. This edition of Cybernetics gives a new generation access to a classic text.
Cybernetics Perspectives in Systems: Proceedings of 11th Computer Science On-line Conference 2022, Vol. 3 (Lecture Notes in Networks and Systems #503)
by Radek SilhavyThis book contains the refereed proceedings of the Cybernetics Perspectives in Systems session of the 11th Computer Science On-line Conference 2022 (CSOC 2022), which was held in April 2022 online. Papers on modern cybernetics and informatics in the context of networks and systems are an important component of current research issues. This volume contains an overview of recent method, algorithms and designs.
Cybernetics, Warfare and Discourse: The Cybernetisation of Warfare in Britain
by Anthimos Alexandros TsirigotisThis book critiques mainstream beliefs about cyberwarfare and forges a new path in the way of defining this largely misunderstood concept. Rather than outlining cyberspace as a new technology applied in military operations, here, Tsirigotis rallies against this technocentric account and establishes how cyberspace, first and foremost, should be categorized as a new way to understand war and military power in the Information Age. Using genre analysis and Corpus Linguistics, the author scrutinizes how cyberspace has changed the way the UK comprehends war and military power, and how the cybernetisation of war has manifested itself in Britain's approach to national defense and security.
Cybernics: Fusion of human, machine and information systems
by Yoshiyuki Sankai Kenji Suzuki Yasuhisa HasegawaCybernics plays a significant role in coping with an aging society using state-of-the-art technologies from engineering, clinical medicine and humanities. This new interdisciplinary field studies technologies that enhance, strengthen, and support physical and cognitive functions of human beings, based on the fusion of human, machine, and information systems. The design of a seamless interface for interaction between the interior and exterior of the human body is described in this book from diverse aspects such as the physical, neurophysiological, and cognitive levels. It is the first book to cover the many aspects of cybernics, allowing readers to understand the life support robotics technology for the elderly, including remote, in-home, hospital, institutional, community medical welfare, and vital-sensing systems. Serving as a valuable resource, this volume will interest not only graduate students, scientists, and engineers but also newcomers to the field of cybernics.
CyberParks – The Interface Between People, Places and Technology: New Approaches and Perspectives (Lecture Notes in Computer Science #11380)
by Carlos Smaniotto Costa Ina Šuklje Erjavec Therese Kenna Michiel De Lange Konstantinos Ioannidis Gabriela Maksymiuk Martijn De WaalThis open access book is about public open spaces, about people, and about the relationship between them and the role of technology in this relationship. It is about different approaches, methods, empirical studies, and concerns about a phenomenon that is increasingly being in the centre of sciences and strategies – the penetration of digital technologies in the urban space. As the main outcome of the CyberParks Project, this book aims at fostering the understanding about the current and future interactions of the nexus people, public spaces and technology. It addresses a wide range of challenges and multidisciplinary perspectives on emerging phenomena related to the penetration of technology in people’s lifestyles - affecting therefore the whole society, and with this, the production and use of public spaces. Cyberparks coined the term cyberpark to describe the mediated public space, that emerging type of urban spaces where nature and cybertechnologies blend together to generate hybrid experiences and enhance quality of life.
Cyberpatterns: Unifying Design Patterns with Security and Attack Patterns
by Clive Blackwell Hong ZhuCyberspace in increasingly important to people in their everyday lives for purchasing goods on the Internet, to energy supply increasingly managed remotely using Internet protocols. Unfortunately, this dependence makes us susceptible to attacks from nation states, terrorists, criminals and hactivists. Therefore, we need a better understanding of cyberspace, for which patterns, which are predictable regularities, may help to detect, understand and respond to incidents better. The inspiration for the workshop came from the existing work on formalising design patterns applied to cybersecurity, but we also need to understand the many other types of patterns that arise in cyberspace.
Cyberphysical Systems for Epilepsy and Related Brain Disorders: Multi-parametric Monitoring and Analysis for Diagnosis and Optimal Disease Management
by Nikolaos S. Voros Christos P. AntonopoulosThis book introduces a new cyberphysical system that combines clinical and basic neuroscience research with advanced data analysis and medical management tools for developing novel applications for the management of epilepsy. The authors describe the algorithms and architectures needed to provide ambulatory, diagnostic and long-term monitoring services, through multi parametric data collection. Readers will see how to achieve in-hospital quality standards, addressing conventional "routine" clinic-based service purposes, at reduced cost, enhanced capability and increased geographical availability. The cyberphysical system described in this book is flexible, can be optimized for each patient and is demonstrated in several case studies.
Cyberpredators and Their Prey
by Lauren R. ShapiroThe online environment has emerged as a continuous and unfettered source of interpersonal criminal activity beyond physical boundaries. Cyberpredators commit their crimes by employing the Internet and online services—social network platforms, online groups and organizations, smart phone apps, bulletin board systems, online forums, websites, internet relay chat channels—to locate and harm victims of all ages through attacking, exploiting, humiliating, bullying, harassing, threatening, defrauding, and exhorting. Cyberpredators and Their Prey describes non-sexual and sexual interpersonal crimes—online romance scam, swatting, trolling, stalking, bullying, harassment, minor sexting, sexual trafficking, child sexual abuse material, sextortion, and image-based sexual abuse offenses. Each chapter contains: crime definition and relevant issues; typical cyberpredator, motives, and methods; typical victims and behaviors that make them targets; current criminal laws for prosecuting cybercrimes and assessment of their applicability and effectiveness as deterrents; the crime’s impact on individual victims and society in general; and cybersecurity prevention and intervention strategies. Also covered are the unique challenges that the regulation, investigation, and prosecution of these cybercrimes pose to criminal justice and private security agents worldwide; the need for society to hold companies operating online responsible for their role in cybercrime; and how aspects of the online environment (i.e., anonymity, toxic disinhibition, de-individuation, inculpability) contribute to harmful and abusive interpersonal interaction, particularly when enacted by perpetrators as part of a group attack. Key features: Portrays material through multidisciplinary lens of psychology, criminal justice, law, and security Provides consistent, practical information about online criminals and victims Compares online to offline versions of the same crime Discusses adequacy of current laws for prosecuting cybercriminals Considers elements of the online environment that foster criminal activity Describes social engineering techniques Considers the role of intimate partner violence in cybercrimes Reviews 21st century skills needed to educate and protect potential targets Cyberpredators and Their Prey will prove essential reading to those who are studying to become, or are currently, security professionals; law enforcement personnel and investigators; intelligence agents; private investigators; lawyers; compliance officers; social service workers; and other professionals who deal with interpersonal cybercrime through the lens of social science.
Cyberprotest: New Media, Citizens and Social Movements
by Wim Van De Donk Brian D. Loader Paul G. Nixon Dieter RuchtEver since the anti-globalisation protests in Seattle in 1999 the adoption of new information and communications technologies (ICTs) by social movement activists has offered the prospect for the development of global cyberprotest. The Internet with its transnational many-to-many communication facility offers a revolutionary potential for social movements to go online and circumvent the 'official' messages of political and commercial organisations and the traditional media, by speaking directly to the citizens of the world. Furthermore the use of electronic mail (e-mail), mailing lists, websites, electronic forums and other online applications provide powerful media tools for co-ordinating the activity of often physically dispersed movement actors. Moreover, ICTs may also contribute to the important function of social movements of shaping collective identity and countering the claims and arguments of established political interests. A growing body of literature during the last decades of the twentieth century attests to the significant impact SMs have had upon the restructuring of the political landscape. Most of that literature addresses the more traditional actors and institutions (e.g. parliaments, political parties, bureaucracy etc.). Less attention has been devoted to those manifestations of political action that are concentrated around social movements and all kinds of more or less institutionalised and sustainable forms of citizen mobilisation. This book is a collection of cases that take a critical look into the way ICTs are finding their way into the world of social movements
Cyberpsychology: An Introduction to Human–Computer Interaction
by Norman Kent L.This textbook provides a comprehensive overview of the human-computer interface in clear, non-technical language, making it an ideal introduction for students of both psychology and computer science. Covering the past, present, and future developments in technology and psychology, it combines cutting-edge academic research with engaging illustrations and examples that show students how the material relates to their lives. Topics addressed include: human factors of input devices, and the basics of sensation and perception; memory and cognitive issues of users navigating their way through interfaces; communication via programming languages and natural speech interaction; cyberpathologies such as techno-stress and Internet addiction disorders; and challenges surrounding automation and artificial intelligence. This thoroughly updated second edition features new chapters on virtual reality and cybersecurity; expanded coverage of social media, mobile computing, e-learning, and video games; and end-of-chapter review questions that ensure students have mastered key objectives.
Cyberpsychology as Everyday Digital Experience across the Lifespan: Everyday Digital Experience Across The Lifespan
by Hannah Frith Julie Morgan Dave HarleyDigital technologies are deeply embedded in everyday life with opportunities for information access and perpetual social contact now mediating most of our activities and relationships. This book expands the lens of Cyberpsychology to consider how digital experiences play out across the various stages of people’s lives. Most psychological research has focused on whether human-technology interactions are a ‘good’ or a ‘bad’ thing for humanity. This book offers a distinctive approach to the emergent area of Cyberpsychology, moving beyond these binary dilemmas and considering how popular technologies have come to frame human experience and relationships. In particular the authors explore the role of significant life stages in defining the evolving purpose of digital technologies. They discuss how people’s symbiotic relationship with digital technologies has started to redefine our childhoods, how we experience ourselves, how we make friends, our experience of being alone, how we have sex and form romantic relationships, our capacity for being antisocial as well as the experience of growing older and dying. This interdisciplinary book will be of great interest to scholars and practitioners across psychology, digital technology and media studies as well as anyone interested in how technology influences our behaviour.
Cyberpunk 2077: Big City Dreams
by Bartosz SztyborTwo scavengers veer paths in their pursuit of happiness through the streets of Night City.Tasha and Mirek make a living for themselves stealing cyberware and indulging in parties and braindances. Tasha is rowdy and wild--she seeks to up her street cred to become the most famous gangster in the city. Mirek, on the other hand, is a calm introvert--he longs for something more--meaning, belonging, warmth. He soon finds hope in an unexpected braindance. As he and Tasha chase their dreams, their paths begin to deviate. Where will they find the happiness they've been searching for? Does it even exist to be found? One thing they can both agree on, in a place like Night City--you run, you fight, you change, or you die. Written by Bartosz Sztybor (CD PROJEKT RED writer and narrative manager, Witcher: Fading Memories)) with art by Filipe Andrade (Old Man Logan, Rocket Raccoon & Groot) and Alessio Fioriniello (Paris Fashion Slam) comes a tale about the demanding life of Night City--where lives are lost, dreams are shattered, and hope is found in what remains.
Cyberpunk 2077: Trauma Team
by Cullen BunnDive deeper into the world of Cyberpunk 2077!Nadia, an assistant EMT for a privately-owned business known as Trauma Team International, is the sole survivor of a failed rescue mission turned shootout.After she agrees to continue work for an upcoming extraction mission, Nadia discovers that her new extraction subject is Apex—the man who's responsible for Nadia's former team members' deaths. A hundred floors high in a skyscraper filled with members of Apex's rival gang, Nadia and her team must complete the extraction. Cullen Bunn (Harrow County, Uncanny X-Men) and Miguel Valderrama (GIANTS, Hunters) introduce a series based on CD Projekt Red's game Cyberpunk 2077!Collects Cyberpunk 2077: Trauma Team #1-4.
Cyberpunk 2077: You Have My Word
by Bartosz SztyborCreated in close collaboration with CD Projekt Red, this graphic novel collecting the comic series based on the hit video game takes you deeper into the ruthless underbelly of Night City and the moral code of the streets.A family is torn apart following an assignment from one of Night City's largest gangs.A new urban development proposal is being pushed through city council—a flagrant infraction on those safeguarded by the Valentinos gang—one to indulge the selfish and decadent lifestyles of the wealthy and displace the eldery in a historic housing block. They enlist the service of three cyberpunks to discreetly and strategically terminate the project. With a mole on the inside, a waitress who dishes out more than meals, a government official with a fetish—everyone has their secrets, and each one is about to get exposed.Collects Cyberpunk 2077: You Have My Word #1-#4.
Cyberpunk 2077: Your Voice
by Aleksandra Motyka Marcin BlachaAleksandra Motyka and Marcin Blacha, writers on the Cyberpunk 2077 video game, and artist Danijel Zezelj (Scalped, Days of Hate, Northlanders, Starve) take you on a fast-paced twisted ride through the darkest corners of Night City. A lonely maintenance worker gets tangled in an anti-corporation operation.During a routine shift, Todd, an employee at Night City Area Rapid Transit, encounters an altercation between a mysterious woman and the Maelstrom gang. As the woman attempts to escape, she hands him a chip. To find her and uncover the data, he sets off on a wild journey through the city's seedy mekka and dangerous wastelands where he meets a sly new client, crazy cyberpunks, and the infamous Johnny Silverhand. He'll finally discover what true love is and why it'll never be possible, not in a place like Night City.
Cybersecurity: A New Approach Using Chaotic Systems (Studies in Big Data #102)
by Ahmed A. Abd El-Latif Christos VolosThis book presents techniques and security challenges of chaotic systems and their use in cybersecurity. It presents the state-of-the-art and the latest discoveries in the field of chaotic systems and methods and proposes new models, practical solutions, and technological advances related to new chaotic dynamical systems. The book can be used as part of the bibliography of the following courses: - Cybersecurity - Cryptography - Networks and Communications Security - Nonlinear Circuits - Nonlinear Systems and Applications
Cybersecurity: Public Sector Threats and Responses (Public Administration And Public Policy Ser.)
by Kim AndreassonThe Internet has given rise to new opportunities for the public sector to improve efficiency and better serve constituents. But with an increasing reliance on the Internet, digital tools are also exposing the public sector to new risks. This accessible primer focuses on the convergence of globalization, connectivity, and the migration of public sector functions online. It examines emerging trends and strategies from around the world and offers practical guidance for addressing contemporary risks. It supplies an overview of relevant U.S. Federal cyber incident response policies and outlines an organizational framework for assessing risk.
Cybersecurity: Geopolitics, Law, and Policy
by Amos N. GuioraThis book examines the legal and policy aspects of cyber-security. It takes a much needed look at cyber-security from a geopolitical perspective. Through this lens, it seeks to broaden the reader's understanding of the legal and political considerations of individuals, corporations, law enforcement and regulatory bodies and management of the complex relationships between them. In drawing on interviews conducted with experts from a wide range of fields, the book presents the reader with dilemmas and paradigms that confront law makers, corporate leaders, law enforcement, and national leaders. The book is structured in a novel format by employing a series of vignettes which have been created as exercises intended to confront the reader with the dilemmas involved in cyber-security. Through the use of vignettes, the work seeks to highlight the constant threat of cyber-security against various audiences, with the overall aim of facilitating discussion and reaction to actual probable events. In this sense, the book seeks to provide recommendations for best practices in response to the complex and numerous threats related to cyber-security. This book will be of interest to students of cyber-security, terrorism, international law, security studies and IR in general, as well as policy makers, professionals and law-enforcement officials.
Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare
by Thomas A. JohnsonThe World Economic Forum regards the threat of cyber attack as one of the top five global risks confronting nations of the world today. Cyber attacks are increasingly targeting the core functions of the economies in nations throughout the world. The threat to attack critical infrastructures, disrupt critical services, and induce a wide range of dam
Cybersecurity: Technology and Governance
by Audun JøsangThis book gives a complete introduction to cybersecurity and its many subdomains. It’s unique by covering both technical and governance aspects of cybersecurity and is easy to read with 150 full color figures. There are also exercises and study cases at the end of each chapter, with additional material on the book's website. The numerous high-profile cyberattacks being reported in the press clearly show that cyberthreats cause serious business risks. For this reason, cybersecurity has become a critical concern for global politics, national security, organizations as well for individual citizens. While cybersecurity has traditionally been a technological discipline, the field has grown so large and complex that proper governance of cybersecurity is needed. The primary audience for this book is advanced level students in computer science focusing on cybersecurity and cyber risk governance. The digital transformation of society also makes cybersecurity relevant in many other disciplines, hence this book is a useful resource for other disciplines, such as law, business management and political science. Additionally, this book is for anyone in the private or public sector, who wants to acquire or update their knowledge about cybersecurity both from a technological and governance perspective.