Browse Results

Showing 29,126 through 29,150 of 55,789 results

Inventive Computation Technologies (Lecture Notes in Networks and Systems #98)

by S. Smys Robert Bestak Álvaro Rocha

With the intriguing development of technologies in several industries, along with the advent of ubiquitous computational resources, there are now ample opportunities to develop innovative computational technologies in order to solve a wide range of issues concerning uncertainty, imprecision, and vagueness in various real-life problems. The challenge of blending modern computational techniques with traditional computing methods has inspired researchers and academics alike to focus on developing innovative computational techniques. In the near future, computational techniques may provide vital solutions by effectively using evolving technologies such as computer vision, natural language processing, deep learning, machine learning, scientific computing, and computational vision. A vast number of intelligent computational algorithms are emerging, along with increasing computational power, which has significantly expanded the potential for developing intelligent applications. These proceedings of the International Conference on Inventive Computation Technologies [ICICT 2019] cover innovative computing applications in the areas of data mining, big data processing, information management, and security.

Inventive Systems and Control: Proceedings of ICISC 2022 (Lecture Notes in Networks and Systems #436)

by V. Suma Zubair Baig Selvanayaki Kolandapalayam Shanmugam Pascal Lorenz

This book presents selected papers from the 6th International Conference on Inventive Systems and Control (ICISC 2022), held on 6–7 January 2022 at JCT College of Engineering and Technology, Coimbatore, India. The conference proceedings of ICISC 2022 includes an analysis of the class of intelligent systems and control techniques that utilizes various artificial intelligence technologies, where there is no mathematical models and system available to make them remain controlled. Inspired by various existing intelligent techniques, the primary goal of ICISC 2022 proceedings is to present the emerging innovative models to tackle the challenges faced by the existing computing and communication technologies.

Inventive Systems and Control: Proceedings of ICISC 2021 (Lecture Notes in Networks and Systems #204)

by V. Suma Joy Iong-Zong Chen Zubair Baig Haoxiang Wang

This book presents selected papers from the 5th International Conference on Inventive Systems and Control (ICISC 2021), held on 7–8 January 2021 at JCT College of Engineering and Technology, Coimbatore, India. The book includes an analysis of the class of intelligent systems and control techniques that utilises various artificial intelligence technologies, where there are no mathematical models and systems available to make them remain controlled. Inspired by various existing intelligent techniques, the primary goal is to present the emerging innovative models to tackle the challenges faced by the existing computing and communication technologies. The proceedings of ICISC 2021 aim at presenting the state-of-the-art research developments, trends, and solutions for the challenges faced by the intelligent systems and control community with the real-world applications. The included research articles feature the novel and unpublished research works on intelligent system representation and control.

Inventive Systems and Control: Proceedings of ICISC 2023 (Lecture Notes in Networks and Systems #672)

by V. Suma Pascal Lorenz Zubair Baig

This book presents selected papers from the 7th International Conference on Inventive Systems and Control (ICISC 2023), held on January 30–31, 2023, at JCT College of Engineering and Technology, Coimbatore, India. The conference proceedings of ICISC 2023 include an analysis of the class of intelligent systems and control techniques that utilizes various artificial intelligence technologies, where there are no mathematical models and system available to make them remain controlled. Inspired by various existing intelligent techniques, the primary goal of ICISC 2023 proceedings is to present the emerging innovative models to tackle the challenges faced by the existing computing and communication technologies.

Inventor 2014 and Inventor LT 2014 Essentials: Autodesk Official Press

by Thom Tremblay

Quickly learn essential inventor tools and techniquesThis full-color Autodesk Official Press guide will help you quickly learn the powerful manufacturing software's core features and functions. Thom Tremblay, an Autodesk Certified Instructor, uses concise, straightforward explanations and real-world, hands-on exercises to help you become productive with Inventor. Full-color screenshots illustrate tutorial steps, and chapters conclude with a related and more open-ended project to further reinforce the chapter's lessons. Based on the very real-world task of designing tools and a toolbox to house them, the book demonstrates creating 2D drawings from 3D data, modeling parts, combining parts into assemblies, annotating drawings, using advanced assembly tools, working with sheet metal, presenting designs, and more. Full-color screenshots illustrate the steps, and additional files are available for download so you can compare your results with those of professionals. You'll also get information to help you prepare for the Inventor certification exams.Introduces new users to the software with real-world projects, hands-on tutorials, and full-color illustrationsBegins each chapter with a quick discussion of concepts and learning goals and then moves into approachable, hands-on exercisesCovers the interface and foundational concepts, modeling parts, combining them into assemblies building with the frame generator, using weldmentsIncludes material to help you prepare for the Inventor certification examsAutodesk Inventor 2014 Essentials provides the information you need to quickly become proficient with the powerful 3D mechanical design software.

Inverse Analyses with Model Reduction

by Vladimir Buljak

In this self-consistent monograph, the author gathers and describes different mathematical techniques and combines all together to form practical procedures for the inverse analyses. It puts together topics coming from mathematical programming, with soft computing and Proper Orthogonal Decomposition, in order to show, in the context of structural analyses, how the things work and what are the main problems one needs to tackle. Throughout the book a number of examples and exercises are worked out in order to make reader practically familiar with discussed topics.

Inverse Problems and Large-Scale Computations

by Larisa Beilina Yury V. Shestopalov

This volume is a result of two international workshops, namely the Second Annual Workshop on Inverse Problems and the Workshop on Large-Scale Modeling, held jointly in Sunne, Sweden from May 1-6 2012. The subject of the inverse problems workshop was to present new analytical developments and new numerical methods for solutions of inverse problems. The objective of the large-scale modeling workshop was to identify large-scale problems arising in various fields of science and technology and covering all possible applications, with a particular focus on urgent problems in theoretical and applied electromagnetics. The workshops brought together scholars, professionals, mathematicians, and programmers and specialists working in large-scale modeling problems. The contributions in this volume are reflective of these themes and will be beneficial to researchers in this area.

Investigating a Phase Conjugate Mirror for Magnon-Based Computing (Springer Theses)

by Alistair Inglis

This work provides a convincing motivation for and introduction to magnon-based computing. The challenges faced by the conventional semiconductor-transistor-based computing industry are contrasted with the many exciting avenues for developing spin waves (or magnons) as a complementary technology wherein information can be encoded, transmitted, and operated upon: essential ingredients for any computing paradigm. From this general foundation, one particular operation is examined: phase conjugation via four-wave-mixing (FWM). The author constructs an original theory describing the generation of a phase conjugate mirror with the remarkable property that any incident spin wave will be reflected back along the same direction of travel. After establishing a theoretical framework, the careful design of the experiment is presented, followed by the demonstration of a magnetic phase conjugate mirror using four-wave mixing for the first time. The thesis concludes with an investigation into the unexpected fractal behaviour observed arising from the phase conjugate mirror – a result that is testament to the richness and vibrancy of these highly nonlinear spin wave systems.

Investigating AI Readiness in the Maltese Public Administration (Lecture Notes in Networks and Systems #568)

by Marvic Sciberras Alexiei Dingli

The book presents a unique study on the Artificial Intelligence (AI) readiness of public administrations focusing on the Maltese public administration as a case study. This was conducted following the launch of the Malta AI National Strategy in 2019. Since the Maltese public administration is the driving force behind the integration of AI solutions nationwide, the research is deemed necessary to understand whether the public workforce itself is ready to face the oncoming AI revolution. The researchers applied a mixed-methods approach to gain insight and a broader perspective of the status quo concerning AI adoption. Important considerations that stem from this study include the need for increased AI knowledge among public administrators since the majority of respondents reported a lack of awareness of AI technologies and their deployment. Understanding AI-related advantages must be accompanied by a robust instructional effort at all levels of education. It was unanimously agreed that the early inclusion of AI-related courses in the Maltese educational system will aid in developing a future AI-savvy workforce. Furthermore, upskilling and reskilling the public officers will facilitate knowledgeable human capital and proficiencies required to effectively integrate AI solutions within society. The study concludes by recommending several critical reforms within governments that will improve the AI-readiness factor of any Public Administration.

Investigating Computer-Related Crime

by Peter Stephenson Keith Gilbert

Since the last edition of this book was written more than a decade ago, cybercrime has evolved. Motives have not changed, but new means and opportunities have arisen with the advancement of the digital age. Investigating Computer-Related Crime: Second Edition incorporates the results of research and practice in a variety of venues, growth in the fi

Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence

by Nick Furneaux

<p>Bitcoin has traditionally been the payment system of choice for a criminal trading on the Dark Web, and now many other blockchain cryptocurrencies are entering the mainstream as traders are accepting them from low-end investors putting their money into the market. Worse still, the blockchain can even be used to hide information and covert messaging, unknown to most investigators. <p><i>Investigating Cryptocurrencies</i> is the first book to help corporate, law enforcement, and other investigators understand the technical concepts and the techniques for investigating crimes utilizing the blockchain and related digital currencies such as Bitcoin and Ethereum. <p> <li>Understand blockchain and transaction technologies <li>Set up and run cryptocurrency accounts <li>Build information about specific addresses <li>Access raw data on blockchain ledgers Identify users of cryptocurrencies <li>Extracting cryptocurrency data from live and imaged computers <li>Following the money</li> <p> <p>With nearly $150 billion in cryptocurrency circulating and $3 billion changing hands daily, crimes committed with or paid for with digital cash are a serious business. Luckily, Investigating Cryptocurrencies Forensics shows you how to detect it and, more importantly, stop it in its tracks.</p>

Investigating Electrical Systems

by Bscs

Electrical systems textbook

Investigating Radicalization Trends: Case Studies in Europe and Asia (Security Informatics and Law Enforcement)

by Babak Akhgar Douglas Wells José María Blanco

This book provides a detailed insight into the complex dynamics of radicalization that are in play amongst contemporary society. The authors focus on understanding emerging trends and models that can be used to analyse and understand modern violent extremist and xenophobic discourse. The chapters cover multiple regions, providing a collective analysis of country-specific case studies for the formulation of best practices, recommendations and learning material. It is recommended that this book may serve as a compendium for practitioners, academics, teachers and students wishing to gain state-of-the art knowledge. Topics covered by the authors vary from hands-on practical information to tactical, operational, strategic and ethical guidance. This book provides a holistic, harmonized approach based upon European internal security strategies recognizing that internal security cannot be achieved in isolation from the rest of the world. Additionally, this material resonates with the EU’s commitment to fight extremism in a rational manner, alongside promoting human rights, democracy, peace and stability within the EU Member States.Presents a comprehensive understanding of the interconnectivities and trends behind emerging radicalisation patterns;Features newest conceptual and practical knowledge to monitor, analyse and respond to radicalization around the world;Provides a comprehensive view into the methodologies for analysis, through visualizations, case studies and applications.

An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks: Critical Information Infrastructure Protection

by E Dawson S. V. Raghavan

Around the globe, nations face the problem of protecting their Critical Information Infrastructure, normally referred to as Cyber Space. In this monograph, we capture FIVE different aspects of the problem; High speed packet capture, Protection through authentication, Technology Transition, Test Bed Simulation, and Policy and Legal Environment. The monograph is the outcome of over three years of cooperation between India and Australia.

Investigations in Computational Sarcasm (Cognitive Systems Monographs #37)

by Aditya Joshi Pushpak Bhattacharyya Mark J. Carman

This book describes the authors’ investigations of computational sarcasm based on the notion of incongruity. In addition, it provides a holistic view of past work in computational sarcasm and the challenges and opportunities that lie ahead. Sarcastic text is a peculiar form of sentiment expression and computational sarcasm refers to computational techniques that process sarcastic text. To first understand the phenomenon of sarcasm, three studies are conducted: (a) how is sarcasm annotation impacted when done by non-native annotators? (b) How is sarcasm annotation impacted when the task is to distinguish between sarcasm and irony? And (c) can targets of sarcasm be identified by humans and computers. Following these studies, the book proposes approaches for two research problems: sarcasm detection and sarcasm generation. To detect sarcasm, incongruity is captured in two ways: ‘intra-textual incongruity’ where the authors look at incongruity within the text to be classified (i.e., target text) and ‘context incongruity’ where the authors incorporate information outside the target text. These approaches use machine-learning techniques such as classifiers, topic models, sequence labelling, and word embeddings. These approaches operate at multiple levels: (a) sentiment incongruity (based on sentiment mixtures), (b) semantic incongruity (based on word embedding distance), (c) language model incongruity (based on unexpected language model), (d) author’s historical context (based on past text by the author), and (e) conversational context (based on cues from the conversation). In the second part of the book, the authors present the first known technique for sarcasm generation, which uses a template-based approach to generate a sarcastic response to user input. This book will prove to be a valuable resource for researchers working on sentiment analysis, especially as applied to automation in social media.

Investigations in Entity Relationship Extraction (Studies in Computational Intelligence #1058)

by Sachin Sharad Pawar Pushpak Bhattacharyya Girish Keshav Palshikar

The book covers several entity and relation extraction techniques starting from the traditional feature-based techniques to the recent techniques using deep neural models. Two important focus areas of the book are – i) joint extraction techniques where the tasks of entity and relation extraction are jointly solved, and ii) extraction of complex relations where relation types can be N-ary and cross-sentence. The first part of the book introduces the entity and relation extraction tasks and explains the motivation in detail. It covers all the background machine learning concepts necessary to understand the entity and relation extraction techniques explained later. The second part of the book provides a detailed survey of the traditional entity and relation extraction problems covering several techniques proposed in the last two decades. The third part of the book focuses on joint extraction techniques which attempt to address both the tasks of entity and relation extraction jointly. Several joint extraction techniques are surveyed and summarized in the book. It also covers two joint extraction techniques in detail which are based on the authors’ work. The fourth and the last part of the book focus on complex relation extraction, where the relation types may be N-ary (having more than two entity arguments) and cross-sentence (entity arguments may span multiple sentences). The book highlights several challenges and some recent techniques developed for the extraction of such complex relations including the authors’ technique. The book also covers a few domain-specific applications where the techniques for joint extraction as well as complex relation extraction are applied.

Investigations in the Workplace

by Eugene F. Ferraro T.J. MacGinley Ban Seng Choo

The process of investigation is dynamic and fluid. The approach must be reasonable and the investigator flexible. However, in order to be successful, every investigation must have a meaningful purpose and be executed ethically and lawfully.Inevitably, employers must invest time, money, and patience to ensure they obtain demonstrable and actionable

Investigative Journalism, Democracy and the Digital Age (Routledge Research in Journalism)

by Andrea Carson

Theoretically grounded and using quantitative data spanning more than 50 years together with qualitative research, this book examines investigative journalism’s role in liberal democracies in the past and in the digital age. In its ideal form, investigative reporting provides a check on power in society and therefore can strengthen democratic accountability. The capacity is important to address now because the political and economic environment for journalism has changed substantially in recent decades. In particular, the commercialization of the Internet has disrupted the business model of traditional media outlets and the ways news content is gathered and disseminated. Despite these disruptions, this book’s central aim is to demonstrate using empirical research that investigative journalism is not in fact in decline in developed economies, as is often feared.

The Investigative Reporter’s Handbook: A Guide To Documents, Databases, And Techniques

by Brant Houston Mark Horvit Investigative Reporters Inc. Editors

Build the fundamental investigative writing and reporting skills you need to investigate anything and anyone. The text’s easy-to-use handbook style allows readers to quickly access any information--everything from how to build quality reporting skills and collaborate on investigations to tips for researching a variety of beats. This is the text on investigative reporting, infused with illustrative quotes and instructive examples from highly-respected journalists around the world.

Investigator's Guide to Steganography

by Gregory Kipper

The Investigator's Guide to Steganography provides a comprehensive look at this unique form of hidden communication from its beginnings to modern uses. It begins by exploring the past; providing insight into how this steganography began and evolved from ancient times to present day. It continues with an in-depth look at the workings of digital steganography and watermarking methods, available tools on the Internet, and the companies who are providing cutting edge steganography and watermarking services. The third section outlines real world uses of steganography. The book concludes by reviewing steganography detection methods and what can be expected in the future.

Investing in Information

by Andy Bytheway

This book gathers together, in a new way, established and contemporary thinking about how to get the best out of information technology and information systems investments. Working managers who are beset by the complexities of information management in the age of Big Data and the Social Web, and students who are trying to make sense of information management in a chaotic world that is more and more driven by the Internet, will all benefit from this new treatment of a long-standing and problematic domain. Importantly, the book reveals and clarifies the dependencies that exist between the inner world of information technology and the outer world of people and organisations at work. The book differs from other books in its reflective approach. It avoids lengthy, descriptive, and prescriptive dogma. Rather, it provides tools for thinking about information management and it identifies strategic and tactical options at six levels: from the simple consideration of information technology and information systems, right through to issues of organisational performance and business strategy. At the heart of the matter are two critical and tightly connected issues: the ways that we conceive and manage an organisation's processes, and the ways that we conceive and manage the information that an organisation needs to sustain those processes. The six-level framework that achieves this clarity is the "Information Management Body of Knowledge" (familiarly known as the "IMBOK"). This easy-to-understand and easy-to-remember framework has been found to be extremely useful in business, in government, in civil society and in education. Throughout the book, selected research papers are identified and summarised. There are also summary chapters from three different operational perspectives: performance and competency assessment using the IMBOK, undertaking research into related issues, and a review of parallel expert thinking. This book stands as a reference point and resource for all those who need to straddle the disparate worlds of "information technology" and "business". It provides firm pedagogical foundations for courses dealing with business management in the information age, and it provides a sound reference framework for researchers who need to position research projects related to information technology and information systems in a wider context. For busy managers, who simply wish to identify, understand and successfully manage information technology-related opportunities, it provides an ideal arrangement of ideas and tools that will help them.

Investment and Employment Opportunities in China (Systems Evaluation, Prediction, and Decision-Making #9)

by Jeffrey Yi-Lin Forrest Tao Lixin

Presenting the most recent statistical data, Investment and Employment Opportunities in China provides first-of-its-kind coverage of the regional economic, industrial, investment, and employment structures in China. After establishing the theoretical foundation, the rest of the book utilizes the model and the methodology presented by the authors to

Investment Strategies Optimization based on a SAX-GA Methodology

by Rui F.M.F. Neves António M.L. Canelas Nuno C.G. Horta

This book presents a new computational finance approach combining a Symbolic Aggregate approximation (SAX) technique with an optimization kernel based on genetic algorithms (GA). While the SAX representation is used to describe the financial time series, the evolutionary optimization kernel is used in order to identify the most relevant patterns and generate investment rules. The proposed approach considers several different chromosomes structures in order to achieve better results on the trading platform The methodology presented in this book has great potential on investment markets.

Invisible

by Eloy Moreno

Emotiva, conmovedora, diferente... Invisible narra, a través de los ojos de un niño, una historia que podría ser la de cualquiera de nosotros. ¿Quién no ha deseado alguna vez ser invisible? ¿Quién no ha deseado alguna vez dejar de serlo? El problema es que nunca he llegado a controlar bien ese poder: A veces, cuando más ganas tenía de ser invisible, era cuando más gente me veía, y en cambio, cuando deseaba que todos me vieran, era cuando a mi cuerpo le daba por desaparecer.

The Invisible Computer: Why Good Products Can Fail, the Personal Computer Is So Complex, and Information Appliances Are the Solution

by Donald A. Norman

Technologies have a life cycle, says Donald A. Norman, and they must change as they pass from youth to maturity. Alas, the computer industry thinks it is still in its rebellious teenage years, exalting in technical complexity.

Refine Search

Showing 29,126 through 29,150 of 55,789 results