- Table View
- List View
Inventive Systems and Control: Proceedings of ICISC 2022 (Lecture Notes in Networks and Systems #436)
by Pascal Lorenz Zubair Baig V. Suma Selvanayaki Kolandapalayam ShanmugamThis book presents selected papers from the 6th International Conference on Inventive Systems and Control (ICISC 2022), held on 6–7 January 2022 at JCT College of Engineering and Technology, Coimbatore, India. The conference proceedings of ICISC 2022 includes an analysis of the class of intelligent systems and control techniques that utilizes various artificial intelligence technologies, where there is no mathematical models and system available to make them remain controlled. Inspired by various existing intelligent techniques, the primary goal of ICISC 2022 proceedings is to present the emerging innovative models to tackle the challenges faced by the existing computing and communication technologies.
Inventive Systems and Control: Proceedings of ICISC 2023 (Lecture Notes in Networks and Systems #672)
by Pascal Lorenz Zubair Baig V. SumaThis book presents selected papers from the 7th International Conference on Inventive Systems and Control (ICISC 2023), held on January 30–31, 2023, at JCT College of Engineering and Technology, Coimbatore, India. The conference proceedings of ICISC 2023 include an analysis of the class of intelligent systems and control techniques that utilizes various artificial intelligence technologies, where there are no mathematical models and system available to make them remain controlled. Inspired by various existing intelligent techniques, the primary goal of ICISC 2023 proceedings is to present the emerging innovative models to tackle the challenges faced by the existing computing and communication technologies.
Inventor 2014 and Inventor LT 2014 Essentials: Autodesk Official Press
by Thom TremblayQuickly learn essential inventor tools and techniquesThis full-color Autodesk Official Press guide will help you quickly learn the powerful manufacturing software's core features and functions. Thom Tremblay, an Autodesk Certified Instructor, uses concise, straightforward explanations and real-world, hands-on exercises to help you become productive with Inventor. Full-color screenshots illustrate tutorial steps, and chapters conclude with a related and more open-ended project to further reinforce the chapter's lessons. Based on the very real-world task of designing tools and a toolbox to house them, the book demonstrates creating 2D drawings from 3D data, modeling parts, combining parts into assemblies, annotating drawings, using advanced assembly tools, working with sheet metal, presenting designs, and more. Full-color screenshots illustrate the steps, and additional files are available for download so you can compare your results with those of professionals. You'll also get information to help you prepare for the Inventor certification exams.Introduces new users to the software with real-world projects, hands-on tutorials, and full-color illustrationsBegins each chapter with a quick discussion of concepts and learning goals and then moves into approachable, hands-on exercisesCovers the interface and foundational concepts, modeling parts, combining them into assemblies building with the frame generator, using weldmentsIncludes material to help you prepare for the Inventor certification examsAutodesk Inventor 2014 Essentials provides the information you need to quickly become proficient with the powerful 3D mechanical design software.
Inverse Analyses with Model Reduction
by Vladimir BuljakIn this self-consistent monograph, the author gathers and describes different mathematical techniques and combines all together to form practical procedures for the inverse analyses. It puts together topics coming from mathematical programming, with soft computing and Proper Orthogonal Decomposition, in order to show, in the context of structural analyses, how the things work and what are the main problems one needs to tackle. Throughout the book a number of examples and exercises are worked out in order to make reader practically familiar with discussed topics.
Inverse Problems and Large-Scale Computations
by Larisa Beilina Yury V. ShestopalovThis volume is a result of two international workshops, namely the Second Annual Workshop on Inverse Problems and the Workshop on Large-Scale Modeling, held jointly in Sunne, Sweden from May 1-6 2012. The subject of the inverse problems workshop was to present new analytical developments and new numerical methods for solutions of inverse problems. The objective of the large-scale modeling workshop was to identify large-scale problems arising in various fields of science and technology and covering all possible applications, with a particular focus on urgent problems in theoretical and applied electromagnetics. The workshops brought together scholars, professionals, mathematicians, and programmers and specialists working in large-scale modeling problems. The contributions in this volume are reflective of these themes and will be beneficial to researchers in this area.
Investigating AI Readiness in the Maltese Public Administration (Lecture Notes in Networks and Systems #568)
by Alexiei Dingli Marvic SciberrasThe book presents a unique study on the Artificial Intelligence (AI) readiness of public administrations focusing on the Maltese public administration as a case study. This was conducted following the launch of the Malta AI National Strategy in 2019. Since the Maltese public administration is the driving force behind the integration of AI solutions nationwide, the research is deemed necessary to understand whether the public workforce itself is ready to face the oncoming AI revolution. The researchers applied a mixed-methods approach to gain insight and a broader perspective of the status quo concerning AI adoption. Important considerations that stem from this study include the need for increased AI knowledge among public administrators since the majority of respondents reported a lack of awareness of AI technologies and their deployment. Understanding AI-related advantages must be accompanied by a robust instructional effort at all levels of education. It was unanimously agreed that the early inclusion of AI-related courses in the Maltese educational system will aid in developing a future AI-savvy workforce. Furthermore, upskilling and reskilling the public officers will facilitate knowledgeable human capital and proficiencies required to effectively integrate AI solutions within society. The study concludes by recommending several critical reforms within governments that will improve the AI-readiness factor of any Public Administration.
Investigating Computer-Related Crime
by Peter Stephenson Keith GilbertSince the last edition of this book was written more than a decade ago, cybercrime has evolved. Motives have not changed, but new means and opportunities have arisen with the advancement of the digital age. Investigating Computer-Related Crime: Second Edition incorporates the results of research and practice in a variety of venues, growth in the fi
Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence
by Nick Furneaux<p>Bitcoin has traditionally been the payment system of choice for a criminal trading on the Dark Web, and now many other blockchain cryptocurrencies are entering the mainstream as traders are accepting them from low-end investors putting their money into the market. Worse still, the blockchain can even be used to hide information and covert messaging, unknown to most investigators. <p><i>Investigating Cryptocurrencies</i> is the first book to help corporate, law enforcement, and other investigators understand the technical concepts and the techniques for investigating crimes utilizing the blockchain and related digital currencies such as Bitcoin and Ethereum. <p> <li>Understand blockchain and transaction technologies <li>Set up and run cryptocurrency accounts <li>Build information about specific addresses <li>Access raw data on blockchain ledgers Identify users of cryptocurrencies <li>Extracting cryptocurrency data from live and imaged computers <li>Following the money</li> <p> <p>With nearly $150 billion in cryptocurrency circulating and $3 billion changing hands daily, crimes committed with or paid for with digital cash are a serious business. Luckily, Investigating Cryptocurrencies Forensics shows you how to detect it and, more importantly, stop it in its tracks.</p>
Investigating Radicalization Trends: Case Studies in Europe and Asia (Security Informatics and Law Enforcement)
by Babak Akhgar José María Blanco Douglas WellsThis book provides a detailed insight into the complex dynamics of radicalization that are in play amongst contemporary society. The authors focus on understanding emerging trends and models that can be used to analyse and understand modern violent extremist and xenophobic discourse. The chapters cover multiple regions, providing a collective analysis of country-specific case studies for the formulation of best practices, recommendations and learning material. It is recommended that this book may serve as a compendium for practitioners, academics, teachers and students wishing to gain state-of-the art knowledge. Topics covered by the authors vary from hands-on practical information to tactical, operational, strategic and ethical guidance. This book provides a holistic, harmonized approach based upon European internal security strategies recognizing that internal security cannot be achieved in isolation from the rest of the world. Additionally, this material resonates with the EU’s commitment to fight extremism in a rational manner, alongside promoting human rights, democracy, peace and stability within the EU Member States.Presents a comprehensive understanding of the interconnectivities and trends behind emerging radicalisation patterns;Features newest conceptual and practical knowledge to monitor, analyse and respond to radicalization around the world;Provides a comprehensive view into the methodologies for analysis, through visualizations, case studies and applications.
Investigating a Phase Conjugate Mirror for Magnon-Based Computing (Springer Theses)
by Alistair InglisThis work provides a convincing motivation for and introduction to magnon-based computing. The challenges faced by the conventional semiconductor-transistor-based computing industry are contrasted with the many exciting avenues for developing spin waves (or magnons) as a complementary technology wherein information can be encoded, transmitted, and operated upon: essential ingredients for any computing paradigm. From this general foundation, one particular operation is examined: phase conjugation via four-wave-mixing (FWM). The author constructs an original theory describing the generation of a phase conjugate mirror with the remarkable property that any incident spin wave will be reflected back along the same direction of travel. After establishing a theoretical framework, the careful design of the experiment is presented, followed by the demonstration of a magnetic phase conjugate mirror using four-wave mixing for the first time. The thesis concludes with an investigation into the unexpected fractal behaviour observed arising from the phase conjugate mirror – a result that is testament to the richness and vibrancy of these highly nonlinear spin wave systems.
Investigations in Computational Sarcasm (Cognitive Systems Monographs #37)
by Aditya Joshi Pushpak Bhattacharyya Mark J. CarmanThis book describes the authors’ investigations of computational sarcasm based on the notion of incongruity. In addition, it provides a holistic view of past work in computational sarcasm and the challenges and opportunities that lie ahead. Sarcastic text is a peculiar form of sentiment expression and computational sarcasm refers to computational techniques that process sarcastic text. To first understand the phenomenon of sarcasm, three studies are conducted: (a) how is sarcasm annotation impacted when done by non-native annotators? (b) How is sarcasm annotation impacted when the task is to distinguish between sarcasm and irony? And (c) can targets of sarcasm be identified by humans and computers. Following these studies, the book proposes approaches for two research problems: sarcasm detection and sarcasm generation. To detect sarcasm, incongruity is captured in two ways: ‘intra-textual incongruity’ where the authors look at incongruity within the text to be classified (i.e., target text) and ‘context incongruity’ where the authors incorporate information outside the target text. These approaches use machine-learning techniques such as classifiers, topic models, sequence labelling, and word embeddings. These approaches operate at multiple levels: (a) sentiment incongruity (based on sentiment mixtures), (b) semantic incongruity (based on word embedding distance), (c) language model incongruity (based on unexpected language model), (d) author’s historical context (based on past text by the author), and (e) conversational context (based on cues from the conversation). In the second part of the book, the authors present the first known technique for sarcasm generation, which uses a template-based approach to generate a sarcastic response to user input. This book will prove to be a valuable resource for researchers working on sentiment analysis, especially as applied to automation in social media.
Investigations in Entity Relationship Extraction (Studies in Computational Intelligence #1058)
by Pushpak Bhattacharyya Sachin Sharad Pawar Girish Keshav PalshikarThe book covers several entity and relation extraction techniques starting from the traditional feature-based techniques to the recent techniques using deep neural models. Two important focus areas of the book are – i) joint extraction techniques where the tasks of entity and relation extraction are jointly solved, and ii) extraction of complex relations where relation types can be N-ary and cross-sentence. The first part of the book introduces the entity and relation extraction tasks and explains the motivation in detail. It covers all the background machine learning concepts necessary to understand the entity and relation extraction techniques explained later. The second part of the book provides a detailed survey of the traditional entity and relation extraction problems covering several techniques proposed in the last two decades. The third part of the book focuses on joint extraction techniques which attempt to address both the tasks of entity and relation extraction jointly. Several joint extraction techniques are surveyed and summarized in the book. It also covers two joint extraction techniques in detail which are based on the authors’ work. The fourth and the last part of the book focus on complex relation extraction, where the relation types may be N-ary (having more than two entity arguments) and cross-sentence (entity arguments may span multiple sentences). The book highlights several challenges and some recent techniques developed for the extraction of such complex relations including the authors’ technique. The book also covers a few domain-specific applications where the techniques for joint extraction as well as complex relation extraction are applied.
Investigations in the Workplace
by Eugene F. Ferraro Ban Seng Choo T.J. MacGinleyThe process of investigation is dynamic and fluid. The approach must be reasonable and the investigator flexible. However, in order to be successful, every investigation must have a meaningful purpose and be executed ethically and lawfully.Inevitably, employers must invest time, money, and patience to ensure they obtain demonstrable and actionable
Investigative Journalism, Democracy and the Digital Age (Routledge Research in Journalism)
by Andrea CarsonTheoretically grounded and using quantitative data spanning more than 50 years together with qualitative research, this book examines investigative journalism’s role in liberal democracies in the past and in the digital age. In its ideal form, investigative reporting provides a check on power in society and therefore can strengthen democratic accountability. The capacity is important to address now because the political and economic environment for journalism has changed substantially in recent decades. In particular, the commercialization of the Internet has disrupted the business model of traditional media outlets and the ways news content is gathered and disseminated. Despite these disruptions, this book’s central aim is to demonstrate using empirical research that investigative journalism is not in fact in decline in developed economies, as is often feared.
Investigator's Guide to Steganography
by Gregory KipperThe Investigator's Guide to Steganography provides a comprehensive look at this unique form of hidden communication from its beginnings to modern uses. It begins by exploring the past; providing insight into how this steganography began and evolved from ancient times to present day. It continues with an in-depth look at the workings of digital steganography and watermarking methods, available tools on the Internet, and the companies who are providing cutting edge steganography and watermarking services. The third section outlines real world uses of steganography. The book concludes by reviewing steganography detection methods and what can be expected in the future.
Investing in Information
by Andy BythewayThis book gathers together, in a new way, established and contemporary thinking about how to get the best out of information technology and information systems investments. Working managers who are beset by the complexities of information management in the age of Big Data and the Social Web, and students who are trying to make sense of information management in a chaotic world that is more and more driven by the Internet, will all benefit from this new treatment of a long-standing and problematic domain. Importantly, the book reveals and clarifies the dependencies that exist between the inner world of information technology and the outer world of people and organisations at work. The book differs from other books in its reflective approach. It avoids lengthy, descriptive, and prescriptive dogma. Rather, it provides tools for thinking about information management and it identifies strategic and tactical options at six levels: from the simple consideration of information technology and information systems, right through to issues of organisational performance and business strategy. At the heart of the matter are two critical and tightly connected issues: the ways that we conceive and manage an organisation's processes, and the ways that we conceive and manage the information that an organisation needs to sustain those processes. The six-level framework that achieves this clarity is the "Information Management Body of Knowledge" (familiarly known as the "IMBOK"). This easy-to-understand and easy-to-remember framework has been found to be extremely useful in business, in government, in civil society and in education. Throughout the book, selected research papers are identified and summarised. There are also summary chapters from three different operational perspectives: performance and competency assessment using the IMBOK, undertaking research into related issues, and a review of parallel expert thinking. This book stands as a reference point and resource for all those who need to straddle the disparate worlds of "information technology" and "business". It provides firm pedagogical foundations for courses dealing with business management in the information age, and it provides a sound reference framework for researchers who need to position research projects related to information technology and information systems in a wider context. For busy managers, who simply wish to identify, understand and successfully manage information technology-related opportunities, it provides an ideal arrangement of ideas and tools that will help them.
Investing in Revolutions: Creating Wealth from Transformational Technology Waves
by Tal ElyashivTake a deep dive into the life cycle of revolutionary technologies. This book is a pivotal read for anyone looking to navigate the burgeoning world of technology investment and serves as a crucial guide for those eager to delve into the complexities and immense potential of emerging technologies like Blockchain, Web3, AI, VR/AR, Quantum computing or Genomics. The book traces the growth journey of these various innovations, offering readers a comprehensive view of how technologies evolve, mature, and potentially (and eventually) transform markets and societies. What makes this book unique is its fusion of forward-looking insights with valuable historical context. It doesn't merely present a roadmap for the future; it anchors its guidance in lessons learned from past tech revolutions. This approach provides a robust framework for understanding not just where technology is heading, but also the why and how behind its trajectory. More than just an investment guide; it's a lens through which you can view the unfolding future of technology. The book offers a balanced view, recognizing the potential pitfalls and hype that often accompany emerging tech, while highlighting the genuine opportunities for creating wealth and driving innovation. Whether you're looking to make your first investment in a tech startup, diversify your portfolio with tech stocks, or simply gain a deeper understanding of how technological innovations shape our world, Investing in Revolutions is an invaluable resource. What You’ll Learn Identify emerging transformational technologies. Understand the ecosystem and investment opportunities of these emerging technologies. Differentiate between overhyped tech fads and technologies with real, sustainable impact. Examine strategies for investing in the tech space, while carefully balancing the risk-reward equation. Navigate uncertainties and make calculated decisions to maximize potential returns. Who This Book Is For Investors, entrepreneurs, and tech enthusiasts
Investment Strategies Optimization based on a SAX-GA Methodology
by Rui F.M.F. Neves Nuno C.G. Horta António M.L. CanelasThis book presents a new computational finance approach combining a Symbolic Aggregate approximation (SAX) technique with an optimization kernel based on genetic algorithms (GA). While the SAX representation is used to describe the financial time series, the evolutionary optimization kernel is used in order to identify the most relevant patterns and generate investment rules. The proposed approach considers several different chromosomes structures in order to achieve better results on the trading platform The methodology presented in this book has great potential on investment markets.
Investment and Employment Opportunities in China (Systems Evaluation, Prediction, and Decision-Making #9)
by Jeffrey Yi-Lin Forrest Tao LixinPresenting the most recent statistical data, Investment and Employment Opportunities in China provides first-of-its-kind coverage of the regional economic, industrial, investment, and employment structures in China. After establishing the theoretical foundation, the rest of the book utilizes the model and the methodology presented by the authors to
Investments Unlimited: A Novel About DevOps, Security, Audit Compliance, and Thriving in the Digital Age
by Jason Cox John Willis Helen Beal Bill Bensing Michael Edenzon Topo Pal Caleb Queern John Rzezotarski Andres VegaSusan Jones had been the CEO of Investments Unlimited, Inc. (IUI) for five years, a financial institution that has successfully navigated their digital transformation. She is quick on her feet and is trusted by the board. But right now—although you can't tell from her demeanor—she was panicking. Today, IUI received notice from bank regulators concerning their unsatisfactory audit and compliance practices. If they failed to address the regulators' concerns within the year, the company could go up in smoke. She didn't understand. How had her team let this happen? How had she let this happen? Over the past several years, IUI had executed a digital transformation strategy following the business accelerating principles of Agile and DevOps. By any metric they had seemingly done things right. Feedback from customers was astounding and conversion rates for new accounts was growing faster than ever. But along the way IUIs manual governance process had become inundated with friction, frustration, and failure for the teams attempting to deliver value for their organizations. Now, it's all hands on deck for a cross-functional team of executives and engineers to develop a modern automated governance process that satisfies regulators without slowing the company's ability to meet customer demands and compete in the market.In the vein of bestselling titles The Phoenix Project and The Unicorn Project, Investments Unlimited helps organizations radically rethink how they handle audit, compliance, and security for their software systems. By introducing concepts, tools, and ideas to reimagine governance, this book catalyzes a more humane way to enable high-velocity software delivery that inspires trust and is inherently more secure.
Invisible
by Eloy MorenoEmotiva, conmovedora, diferente... Invisible narra, a través de los ojos de un niño, una historia que podría ser la de cualquiera de nosotros. ¿Quién no ha deseado alguna vez ser invisible? ¿Quién no ha deseado alguna vez dejar de serlo? El problema es que nunca he llegado a controlar bien ese poder: A veces, cuando más ganas tenía de ser invisible, era cuando más gente me veía, y en cambio, cuando deseaba que todos me vieran, era cuando a mi cuerpo le daba por desaparecer.
Invisible Doctrine: The Secret History of Neoliberalism
by George Monbiot Peter HutchisonWe live under an ideology that preys on every aspect of our lives: our education and our jobs; our healthcare and our leisure; our relationships and our mental well-being; the planet we inhabit—the very air we breathe. It is everywhere. Yet for most people, it has no name. It seems inescapable, like a natural law.But trace it back to its roots, and you see that this ideology is neither inevitable nor immutable. It was conceived and propagated—and then concealed—by the powerful few. Our task is to bring it into the light—and to build a new system that is worth fighting for. Neoliberalism.Do you know what it is?
Invisible Engines: How Software Platforms Drive Innovation and Transform Industries (The\mit Press Ser.)
by Richard Schmalensee David S. Evans Andrei HagiuHarnessing the power of software platforms: what executives and entrepreneurs must know about how to use this technology to transform industries and how to develop the strategies that will create value and drive profits.Software platforms are the invisible engines that have created, touched, or transformed nearly every major industry for the past quarter century. They power everything from mobile phones and automobile navigation systems to search engines and web portals. They have been the source of enormous value to consumers and helped some entrepreneurs build great fortunes. And they are likely to drive change that will dwarf the business and technology revolution we have seen to this point. Invisible Engines examines the business dynamics and strategies used by firms that recognize the transformative power unleashed by this new revolution—a revolution that will change both new and old industries.The authors argue that in order to understand the successes of software platforms, we must first understand their role as a technological meeting ground where application developers and end users converge. Apple, Microsoft, and Google, for example, charge developers little or nothing for using their platforms and make most of their money from end users; Sony PlayStation and other game consoles, by contrast, subsidize users and make more money from developers, who pay royalties for access to the code they need to write games. More applications attract more users, and more users attract more applications. And more applications and more users lead to more profits.Invisible Engines explores this story through the lens of the companies that have mastered this platform-balancing act. It offers detailed studies of the personal computer, video game console, personal digital assistant, smart mobile phone, and digital media software platform industries, focusing on the business decisions made by industry players to drive profits and stay a step ahead of the competition. Shorter discussions of Internet-based software platforms provide an important glimpse into a future in which the way we buy, pay, watch, listen, learn, and communicate will change forever. An electronic version of this book is available under a Creative Commons license.
Invisible Rulers: The People Who Turn Lies into Reality
by Renee DiRestaAn &“essential and riveting&” (Jonathan Haidt) analysis of the radical shift in the dynamics of power and influence, revealing how the machinery that powered the Big Lie works to create bespoke realities revolutionizing politics, culture, and society. Renée DiResta&’s powerful, original investigation into the way power and influence have been profoundly transformed reveals how a virtual rumor mill of niche propagandists increasingly shapes public opinion. While propagandists position themselves as trustworthy Davids, their reach, influence, and economics make them classic Goliaths—invisible rulers who create bespoke realities to revolutionize politics, culture, and society. Their work is driven by a simple maxim: if you make it trend, you make it true. By revealing the machinery and dynamics of the interplay between influencers, algorithms, and online crowds, DiResta vividly illustrates the way propagandists deliberately undermine belief in the fundamental legitimacy of institutions that make society work. This alternate system for shaping public opinion, unexamined until now, is rewriting the relationship between the people and their government in profound ways. It has become a force so shockingly effective that its destructive power seems limitless. Scientific proof is powerless in front of it. Democratic validity is bulldozed by it. Leaders are humiliated by it. But they need not be. With its deep insight into the power of propagandists to drive online crowds into battle—while bearing no responsibility for the consequences—Invisible Rulers not only predicts those consequences but offers ways for leaders to rapidly adapt and fight back.