Browse Results

Showing 32,601 through 32,625 of 54,275 results

Making with Data: Physical Design and Craft in a Data-Driven World (AK Peters Visualization Series)

by Samuel Huron Till Nagel Lora Oehlberg Wesley Willett

How can we give data physical form? And how might those creations change the ways we experience data and the stories it can tell? Making with Data: Physical Design and Craft in a Data-Driven World provides a snapshot of the diverse practices contemporary creators are using to produce objects, spaces, and experiences imbued with data. Across 25+ beautifully-illustrated chapters, international artists, designers, and scientists each explain the process of creating a specific data-driven piece—illustrating their practice with candid sketches, photos, and design artifacts from their own studios. Featuring influential voices in computer science, data science, graphic design, art, craft, and architecture, Making with Data is accessible and inspiring for enthusiasts and experts alike.

Making Your CAM Journey Easier with Fusion 360: Learn the basics of turning, milling, laser cutting, and 3D printing

by Fabrizio Cimo

Turn your design ideas into 3D models using Fusion 360 by honing your design skills and learning the best practices of common production technologiesPurchase of the print or Kindle book includes a free PDF eBookKey FeaturesGet familiar with Fusion 360 CAM Module and its machining potential with hands-on exercisesExplore major production technologies like turning, milling, laser cutting, and additive manufacturingLearn how to setup your program and simulate stock removalBook DescriptionDownloading a piece of 3D software and shaping concepts and ideas is quite easy. However, designing feasible and cost-effective real parts from 3D models can be challenging with traditional production technologies, or even additive manufacturing. This book will give you the know-how and skills to develop your projects from ideas to physical products, and overcome these obstacles.In 'Making Your CAM Journey Easier with Fusion 360', you'll discover how to set up a CAM program, pick the right tool, and optimize production. You'll learn the pros and cons of different production technologies, including turning, milling, laser cutting, and 3D printing, and understand how to choose the best option based on your needs. You'll also explore the important computer-aided manufacturing tools that Fusion 360 offers through the use of examples and best practices.By the end of this book, you'll understand the potential issues and drawbacks of different design components and apply workarounds to avoid design flaws.What you will learnChoose the best approach for different parts and shapesAvoid design flaws from a manufacturing perspectiveDiscover the different machining strategiesUnderstand how different tool geometries can influence machining resultsDiscover how to check the tool simulation for errorsUnderstand possible fixtures for raw material blocksBecome proficient in optimizing parameters for your machineExplore machining theory and formulas to evaluate cutting parametersWho this book is forThis book is for 3D enthusiasts or mechanical designers looking to turn their design ideas into 3D models, and their 3D models into final products. Familiarity with any CAD software or Fusion 360 design module is recommended; the book will then teach you the rest.

Making Your Primary School E-safe: Whole School Cyberbullying and E-safety Strategies for Meeting Ofsted Requirements

by Adrienne Katz

Children are using the internet and mobile devices at increasingly younger ages, and it's becoming more and more important to address e-safety in primary schools. This practical book provides guidance on how to teach and promote e-safety and tackle cyberbullying with real-life examples from schools of what works and what schools need to do. The book explains how to set policy and procedures, how to train staff and involve parents, and provides practical strategies and ready-to-use activities for teaching e-safety and meeting Ofsted requirements. Including up-to-the-minute information and advice that includes new technologies, social media sites, and recent school policy trends such as 'Bring Your Own Device', this book provides all of the information that educational professionals need to implement successful whole school e-safety strategies.

Malicious Attack Propagation and Source Identification (Advances in Information Security #73)

by Jiaojiao Jiang Sheng Wen Bo Liu Shui Yu Yang Xiang Wanlei Zhou

This book covers and makes four major contributions: 1) analyzing and surveying the pros and cons of current approaches for identifying rumor sources on complex networks; 2) proposing a novel approach to identify rumor sources in time-varying networks; 3) developing a fast approach to identify multiple rumor sources; 4) proposing a community-based method to overcome the scalability issue in this research area. These contributions enable rumor source identification to be applied effectively in real-world networks, and eventually diminish rumor damages, which the authors rigorously illustrate in this book. In the modern world, the ubiquity of networks has made us vulnerable to various risks. For instance, viruses propagate throughout the Internet and infect millions of computers. Misinformation spreads incredibly fast in online social networks, such as Facebook and Twitter. Infectious diseases, such as SARS, H1N1 or Ebola, have spread geographically and killed hundreds of thousands people. In essence, all of these situations can be modeled as a rumor spreading through a network, where the goal is to find the source of the rumor so as to control and prevent network risks. So far, extensive work has been done to develop new approaches to effectively identify rumor sources. However, current approaches still suffer from critical weaknesses. The most serious one is the complex spatiotemporal diffusion process of rumors in time-varying networks, which is the bottleneck of current approaches. The second problem lies in the expensively computational complexity of identifying multiple rumor sources. The third important issue is the huge scale of the underlying networks, which makes it difficult to develop efficient strategies to quickly and accurately identify rumor sources. These weaknesses prevent rumor source identification from being applied in a broader range of real-world applications. This book aims to analyze and address these issues to make rumor source identification more effective and applicable in the real world. The authors propose a novel reverse dissemination strategy to narrow down the scale of suspicious sources, which dramatically promotes the efficiency of their method. The authors then develop a Maximum-likelihood estimator, which can pin point the true source from the suspects with high accuracy. For the scalability issue in rumor source identification, the authors explore sensor techniques and develop a community structure based method. Then the authors take the advantage of the linear correlation between rumor spreading time and infection distance, and develop a fast method to locate the rumor diffusion source. Theoretical analysis proves the efficiency of the proposed method, and the experiment results verify the significant advantages of the proposed method in large-scale networks. This book targets graduate and post-graduate students studying computer science and networking. Researchers and professionals working in network security, propagation models and other related topics, will also be interested in this book.

Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet

by Ken Dunham Jim Melnick

Originally designed as neutral entities, computerized bots are increasingly being used maliciously by online criminals in mass spamming events, fraud, extortion, identity theft, and software theft. Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet explores the rise of dangerous bots and exposes the nefarious methods of "botmasters". This valuable resource assists information security managers in understanding the scope, sophistication, and criminal uses of bots. With sufficient technical detail to empower IT professionals, this volume provides in-depth coverage of the top bot attacks against financial and government networks over the last several years. The book presents exclusive details of the operation of the notorious Thr34t Krew, one of the most malicious bot herder groups in recent history. Largely unidentified by anti-virus companies, their bots spread globally for months, launching massive distributed denial of service (DDoS) attacks and warez (stolen software distributions). For the first time, this story is publicly revealed, showing how the botherders got arrested, along with details on other bots in the world today. Unique descriptions of the criminal marketplace - how criminals make money off of your computer - are also a focus of this exclusive book! With unprecedented detail, the book goes on to explain step-by-step how a hacker launches a botnet attack, providing specifics that only those entrenched in the cyber-crime investigation world could possibly offer. Authors Ken Dunham and Jim Melnick serve on the front line of critical cyber-attacks and countermeasures as experts in the deployment of geopolitical and technical bots. Their work involves advising upper-level government officials and executives who control some of the largest networks in the world. By examining the methods of Internet predators, information security managers will be better able to proactively protect their own networks from such attacks.

Malicious Mobile Code: Virus Protection for Windows

by Roger A. Grimes

"Malicious mobile code" is a new term to describe all sorts of destructive programs: viruses, worms, trojans, and rogue Internet content. Malicious mobile code is more prevalent today than ever before, and both home users and system administrators need to be on the alert to protect their network or company against attacks. Malicious Mobile Code reveals what such code can and can't do and how to recognize, remove, and prevent it. Readers learn effective strategies, tips, and tricks for securing any system.

Malicious Mobile Code: Virus Protection for Windows

by Roger A. Grimes

Malicious mobile code is a new term to describe all sorts of destructive programs: viruses, worms, Trojans, and rogue Internet content. Until fairly recently, experts worried mostly about computer viruses that spread only through executable files, not data files, and certainly not through email exchange. The Melissa virus and the Love Bug proved the experts wrong, attacking Windows computers when recipients did nothing more than open an email. Today, writing programs is easier than ever, and so is writing malicious code. The idea that someone could write malicious code and spread it to 60 million computers in a matter of hours is no longer a fantasy.The good news is that there are effective ways to thwart Windows malicious code attacks, and author Roger Grimes maps them out inMalicious Mobile Code: Virus Protection for Windows. His opening chapter on the history of malicious code and the multi-million dollar anti-virus industry sets the stage for a comprehensive rundown on today's viruses and the nuts and bolts of protecting a system from them. He ranges through the best ways to configure Windows for maximum protection, what a DOS virus can and can't do, what today's biggest threats are, and other important and frequently surprising information. For example, how many people know that joining a chat discussion can turn one's entire computer system into an open book?Malicious Mobile Code delivers the strategies, tips, and tricks to secure a system against attack. It covers:The current state of the malicious code writing and cracker communityHow malicious code works, what types there are, and what it can and cannot doCommon anti-virus defenses, including anti-virus softwareHow malicious code affects the various Windows operating systems, and how to recognize, remove, and prevent itMacro viruses affecting MS Word, MS Excel, and VBScriptJava applets and ActiveX controlsEnterprise-wide malicious code protectionHoaxesThe future of malicious mobile code and how to combat such codeThese days, when it comes to protecting both home computers and company networks against malicious code, the stakes are higher than ever.Malicious Mobile Code is the essential guide for securing a system from catastrophic loss.

Malicious Mobile Code

by Roger A. Grimes

Malicious mobile code is a new term to describe all sorts of destructive programs: viruses, worms, Trojans, and rogue Internet content. Until fairly recently, experts worried mostly about computer viruses that spread only through executable files, not data files, and certainly not through email exchange. The Melissa virus and the Love Bug proved the experts wrong, attacking Windows computers when recipients did nothing more than open an email. Today, writing programs is easier than ever, and so is writing malicious code. The idea that someone could write malicious code and spread it to 60 million computers in a matter of hours is no longer a fantasy. The good news is that there are effective ways to thwart Windows malicious code attacks, and author Roger Grimes maps them out in Malicious Mobile Code: Virus Protection for Windows. His opening chapter on the history of malicious code and the multi-million dollar anti-virus industry sets the stage for a comprehensive rundown on today's viruses and the nuts and bolts of protecting a system from them. He ranges through the best ways to configure Windows for maximum protection, what a DOS virus can and can't do, what today's biggest threats are, and other important and frequently surprising information. For example, how many people know that joining a chat discussion can turn one's entire computer system into an open book? Malicious Mobile Code delivers the strategies, tips, and tricks to secure a system against attack. It covers: The current state of the malicious code writing and cracker community How malicious code works, what types there are, and what it can and cannot do Common anti-virus defenses, including anti-virus software How malicious code affects the various Windows operating systems, and how to recognize, remove, and prevent it Macro viruses affecting MS Word, MS Excel, and VBScript Java applets and ActiveX controls Enterprise-wide malicious code protection Hoaxes The future of malicious mobile code and how to combat such code These days, when it comes to protecting both home computers and company networks against malicious code, the stakes are higher than ever. Malicious Mobile Code is the essential guide for securing a system from catastrophic loss.

Malware Analysis and Detection Engineering: A Comprehensive Approach to Detect and Analyze Modern Malware

by Abhijit Mohanta Anoop Saldanha

Discover how the internals of malware work and how you can analyze and detect it. You will learn not only how to analyze and reverse malware, but also how to classify and categorize it, giving you insight into the intent of the malware. Malware Analysis and Detection Engineering is a one-stop guide to malware analysis that simplifies the topic by teaching you undocumented tricks used by analysts in the industry. You will be able to extend your expertise to analyze and reverse the challenges that malicious software throws at you. The book starts with an introduction to malware analysis and reverse engineering to provide insight on the different types of malware and also the terminology used in the anti-malware industry. You will know how to set up an isolated lab environment to safely execute and analyze malware. You will learn about malware packing, code injection, and process hollowing plus how to analyze, reverse, classify, and categorize malware using static and dynamic tools. You will be able to automate your malware analysis process by exploring detection tools to modify and trace malware programs, including sandboxes, IDS/IPS, anti-virus, and Windows binary instrumentation.The book provides comprehensive content in combination with hands-on exercises to help you dig into the details of malware dissection, giving you the confidence to tackle malware that enters your environment.What You Will LearnAnalyze, dissect, reverse engineer, and classify malwareEffectively handle malware with custom packers and compilersUnpack complex malware to locate vital malware components and decipher their intentUse various static and dynamic malware analysis tools Leverage the internals of various detection engineering tools to improve your workflow Write Snort rules and learn to use them with Suricata IDS Who This Book Is ForSecurity professionals, malware analysts, SOC analysts, incident responders, detection engineers, reverse engineers, and network security engineers"This book is a beast! If you're looking to master the ever-widening field of malware analysis, look no further. This is the definitive guide for you." Pedram Amini, CTO Inquest; Founder OpenRCE.org and ZeroDayInitiative

Malware Analysis Techniques: Tricks for the triage of adversarial software

by Dylan Barker

Analyze malicious samples, write reports, and use industry-standard methodologies to confidently triage and analyze adversarial software and malwareKey FeaturesInvestigate, detect, and respond to various types of malware threatUnderstand how to use what you've learned as an analyst to produce actionable IOCs and reportingExplore complete solutions, detailed walkthroughs, and case studies of real-world malware samplesBook DescriptionMalicious software poses a threat to every enterprise globally. Its growth is costing businesses millions of dollars due to currency theft as a result of ransomware and lost productivity. With this book, you'll learn how to quickly triage, identify, attribute, and remediate threats using proven analysis techniques. Malware Analysis Techniques begins with an overview of the nature of malware, the current threat landscape, and its impact on businesses. Once you've covered the basics of malware, you'll move on to discover more about the technical nature of malicious software, including static characteristics and dynamic attack methods within the MITRE ATT&CK framework. You'll also find out how to perform practical malware analysis by applying all that you've learned to attribute the malware to a specific threat and weaponize the adversary's indicators of compromise (IOCs) and methodology against them to prevent them from attacking. Finally, you'll get to grips with common tooling utilized by professional malware analysts and understand the basics of reverse engineering with the NSA's Ghidra platform. By the end of this malware analysis book, you'll be able to perform in-depth static and dynamic analysis and automate key tasks for improved defense against attacks.What you will learnDiscover how to maintain a safe analysis environment for malware samplesGet to grips with static and dynamic analysis techniques for collecting IOCsReverse-engineer and debug malware to understand its purposeDevelop a well-polished workflow for malware analysisUnderstand when and where to implement automation to react quickly to threatsPerform malware analysis tasks such as code analysis and API inspectionWho this book is forThis book is for incident response professionals, malware analysts, and researchers who want to sharpen their skillset or are looking for a reference for common static and dynamic analysis techniques. Beginners will also find this book useful to get started with learning about malware analysis. Basic knowledge of command-line interfaces, familiarity with Windows and Unix-like filesystems and registries, and experience in scripting languages such as PowerShell, Python, or Ruby will assist with understanding the concepts covered.

Malware Analysis Using Artificial Intelligence and Deep Learning

by Mark Stamp Mamoun Alazab Andrii Shalaginov

​This book is focused on the use of deep learning (DL) and artificial intelligence (AI) as tools to advance the fields of malware detection and analysis. The individual chapters of the book deal with a wide variety of state-of-the-art AI and DL techniques, which are applied to a number of challenging malware-related problems. DL and AI based approaches to malware detection and analysis are largely data driven and hence minimal expert domain knowledge of malware is needed.This book fills a gap between the emerging fields of DL/AI and malware analysis. It covers a broad range of modern and practical DL and AI techniques, including frameworks and development tools enabling the audience to innovate with cutting-edge research advancements in a multitude of malware (and closely related) use cases.

Malware Analyst's Cookbook and DVD

by Blake Hartstein Steven Adair Michael Ligh Matthew Richard

A computer forensics "how-to" for fighting malicious code and analyzing incidentsWith our ever-increasing reliance on computers comes an ever-growing risk of malware. Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses, worms, spyware, rootkits, adware, and other invasive software. Written by well-known malware experts, this guide reveals solutions to numerous problems and includes a DVD of custom programs and tools that illustrate the concepts, enhancing your skills.Security professionals face a constant battle against malicious software; this practical manual will improve your analytical capabilities and provide dozens of valuable and innovative solutionsCovers classifying malware, packing and unpacking, dynamic malware analysis, decoding and decrypting, rootkit detection, memory forensics, open source malware research, and much moreIncludes generous amounts of source code in C, Python, and Perl to extend your favorite tools or build new ones, and custom programs on the DVD to demonstrate the solutionsMalware Analyst's Cookbook is indispensible to IT security administrators, incident responders, forensic analysts, and malware researchers.

Malware Data Science: Attack Detection and Attribution

by Joshua Saxe Hillary Sanders

Malware Data Science explains how to identify, analyze, and classify large-scale malware using machine learning and data visualization.Security has become a "big data" problem. The growth rate of malware has accelerated to tens of millions of new files per year while our networks generate an ever-larger flood of security-relevant data each day. In order to defend against these advanced attacks, you'll need to know how to think like a data scientist. In Malware Data Science, security data scientist Joshua Saxe introduces machine learning, statistics, social network analysis, and data visualization, and shows you how to apply these methods to malware detection and analysis. You'll learn how to:- Analyze malware using static analysis- Observe malware behavior using dynamic analysis- Identify adversary groups through shared code analysis- Catch 0-day vulnerabilities by building your own machine learning detector- Measure malware detector accuracy- Identify malware campaigns, trends, and relationships through data visualization Whether you're a malware analyst looking to add skills to your existing arsenal, or a data scientist interested in attack detection and threat intelligence, Malware Data Science will help you stay ahead of the curve.

The Mammoth Book of Graphic Novels for Minecrafters: Three Unofficial Adventures for Minecrafters (Unofficial Graphic Novel for Minecrafter)

by Cara Stevens

Packaged Together for the First Time, the Second Three Installments of Sky Pony&’s Redstone Junior High Series! When quiet farm girl Pixel receives an acceptance letter from the prestigious academy for gifted students, Redstone Junior High, she is thrilled! Little does Pixel know that the school's long history of safety is about to take an unsettling turn. The adventures that unfold will test Pixel's courage, reveal a unique and precious gift that she never knew she had, and help her create friendships that will change the course of her life. This bind up contains the following graphic novels: When Endermen Attack Curse of the Sand Witches When Pigmen Fly ​The Mammoth Book of Graphic Novels for Minecrafters will captivate readers of all ages who love playing Minecraft and love stories full of action, adventure, and bravery. <P><P> <i>Advisory: Bookshare has learned that this book offers only partial accessibility. We have kept it in the collection because it is useful for some of our members. Benetech is actively working on projects to improve accessibility issues such as these.</i>

Man-Machine-Environment System Engineering: Proceedings of the 20th International Conference on MMESE (Lecture Notes in Electrical Engineering #645)

by Balbir S. Dhillon Shengzhao Long

This book presents selected papers introducing readers to the key research topics and latest development trends in the theory and application of MMESE. The advanced integrated research topic man-machine-environment system engineering (MMESE) was first established in China by Professor Shengzhao Long in 1981, with direct support from one of the greatest modern Chinese scientists, Xuesen Qian. In a letter to Shengzhao Long from October 22nd, 1993, Xuesen Qian wrote: “You have created a very important modern science and technology in China!”MMESE primarily focuses on the relationship between man, machine and environment, studying the optimum combination of man-machine-environment systems, where “man” refers to people in the workplace (e.g., operators, decision-makers), “machine” is the general name for any object controlled by man (including tools, machinery, computers, systems and technologies), and “environment” describes the specific working conditions under which man and machine interact (e.g., temperature, noise, vibration and hazardous gases). The three goals of optimizing such systems are ensuring safety, efficiency and economy.Presenting interdisciplinary studies on the concepts and methods in physiology, psychology, system engineering, computer science, environmental science, management, education and other related disciplines, this book is a valuable resource for all researchers and professionals whose work involves MMESE subjects.

Man-Machine-Environment System Engineering: Proceedings of the 22nd International Conference on MMESE (Lecture Notes in Electrical Engineering #941)

by Balbir S. Dhillon Shengzhao Long

Man-Machine-Environment System Engineering: Proceedings of the 22nd Conference on MMESE are an academic showcase of the best papers selected from more than 500 submissions, introducing readers to the top research topics and the latest developmental trends in the theory and application of MMESE. This proceedings are interdisciplinary studies on the concepts and methods of physiology, psychology, system engineering, computer science, environment science, management, education, and other related disciplines. Researchers and professionals who study an interdisciplinary subject crossing above disciplines or researchers on MMESE subject will be mainly benefited from this proceedingsMMESE primarily focuses on the relationship between Man, Machine and Environment, studying the optimum combination of man-machine-environment systems. In this system, “Man” refers to working people as the subject in the workplace (e.g. operators, decision-makers); “Machine” is the general name for any object controlled by Man (including tools, machinery, computers, systems and technologies), and “Environment” describes the specific working conditions under which Man and Machine interact (e.g. temperature, noise, vibration, hazardous gases etc.). The three goals of optimization of the man-machine-environment systems are to ensure safety, efficiency and economy. The integrated and advanced science research topic Man-Machine-Environment System Engineering (MMESE) was first established in China by Professor Shengzhao Long in 1981, with direct support from one of the greatest modern Chinese scientists, Xuesen Qian. In a letter to Shengzhao Long from October 22nd, 1993, Xuesen Qian wrote: “You have created a very important modern science and technology in China!”

Man-Machine-Environment System Engineering: Proceedings of the 23rd International Conference on MMESE (Lecture Notes in Electrical Engineering #1069)

by Shengzhao Long Balbir S. Dhillon

Man-Machine-Environment System Engineering: Proceedings of the 23rd Conference on MMESE are an academic showcase of the best papers selected from more than 500 submissions, introducing readers to the top research topics and the latest developmental trends in the theory and application of MMESE. This proceedings are interdisciplinary studies on the concepts and methods of physiology, psychology, system engineering, computer science, environment science, management, education, and other related disciplines. Researchers and professionals who study an interdisciplinary subject crossing above disciplines or researchers on MMESE subject will be mainly benefited from this proceedings.MMESE primarily focuses on the relationship between Man, Machine and Environment, studying the optimum combination of man-machine-environment systems. In this system, “Man” refers to working people as the subject in the workplace (e.g. operators, decision-makers); “Machine” is the general name for any object controlled by Man (including tools, machinery, computers, systems and technologies), and “Environment” describes the specific working conditions under which Man and Machine interact (e.g. temperature, noise, vibration, hazardous gases etc.). The three goals of optimization of the man-machine-environment systems are to ensure safety, efficiency and economy.The integrated and advanced science research topic Man-Machine-Environment System Engineering (MMESE) was first established in China by Professor Shengzhao Long in 1981, with direct support from one of the greatest modern Chinese scientists, Xuesen Qian. In a letter to Shengzhao Long from October 22nd, 1993, Xuesen Qian wrote: “You have created a very important modern science and technology in China!”

Man-Machine-Environment System Engineering: Commemorative Conference for the 110th Anniversary of Xuesen Qian’s Birth and the 40th Anniversary of Founding of Man-Machine-Environment System Engineering (Lecture Notes in Electrical Engineering #800)

by Shengzhao Long Balbir S. Dhillon

Man-Machine-Environment System Engineering: Proceedings of the 21st Conference on MMESE is the academic showcase of best research papers selected from more than 500 submissions each year. From this book reader will learn the best research topics and the latest development trend in MMESE design theory and other human-centered system application.MMESE focus mainly on the relationship between Man, Machine and Environment. It studies the optimum combination of man-machine-environment systems. In the system, the Man means the working people as the subject in the workplace (e.g. operator, decision-maker); the Machine means the general name of any object controlled by the Man (including tool, Machinery, Computer, system and technology), the Environment means the specially working conditions under which Man and Machine occupy together(e.g. temperature, noise, vibration, hazardous gases etc.). The three goals of the optimization of the system are safety, efficiency and economy.In 1981 with direct support from one of the greatest modern Chinese scientists, Qian Xuesen, Man-Machine-Environment System Engineering (MMESE), the integrated and advanced science research topic was established in China by Professor Shengzhao Long. In the letter to Shengzhao Long, in October 22nd, 1993, Qian Xuesen wrote: “You have created a very important modern science subject and technology in China!”.

Man-Machine Interactions 4

by Aleksandra Gruca Agnieszka Brachman Stanisław Kozielski Tadeusz Czachórski

This book provides an overview of the current state of research on development and application of methods, algorithms, tools and systems associated with the studies on man-machine interaction. Modern machines and computer systems are designed not only to process information, but also to work in dynamic environment, supporting or even replacing human activities in areas such as business, industry, medicine or military. The interdisciplinary field of research on man-machine interactions focuses on broad range of aspects related to the ways in which human make or use computational artifacts, systems and infrastructure. This monograph is the fourth edition in the series and presents new concepts concerning analysis, design and evaluation of man-machine systems. The selection of high-quality, original papers covers a wide scope of research topics focused on the main problems and challenges encountered within rapidly evolving new forms of human-machine relationships. The presented material is structured into following sections: human-computer interfaces, robot, control, embedded and navigation systems, bio-data analysis and mining, biomedical signal processing, image and motion data processing, decision support and expert systems, pattern recognition, fuzzy systems, algorithms and optimisation, computer networks and mobile technologies, and data management systems.

Man-Machine Interactions 6: 6th International Conference on Man-Machine Interactions, ICMMI 2019, Cracow, Poland, October 2-3, 2019 (Advances in Intelligent Systems and Computing #1061)

by Aleksandra Gruca Tadeusz Czachórski Sebastian Deorowicz Katarzyna Harężlak Agnieszka Piotrowska

This book includes a selection papers describing the latest advances and discoveries in the field of human-computer interactions, which were presented at the 6th International Conference on Man-Machine Interactions, ICMMI 2019, held in Cracow, Poland, in October 2019. Human-computer interaction is a multidisciplinary field concerned with the design of computer technology and, in particular, the interaction between humans (the users) and computers. Over recent decades, this field has expanded from its initial focus on individual and generic user behavior to the widest possible spectrum of human experiences and activities. The book features papers covering a variety of topics, which are divided into five sections: ‘human-computer interfaces,’ ‘artificial intelligence and knowledge discovery,’ ‘pattern recognition,’ ‘bio-data and bio-signal analysis,’ and ‘algorithms, optimization and signal processing.’ Presenting the latest research in the field, this book provides a valuable reference resource for academics, industry practitioners and students.

Man-Machine Speech Communication: 18th National Conference, NCMMSC 2023, Suzhou, China, December 8–10, 2023, Proceedings (Communications in Computer and Information Science #2006)

by Jia Jia Zhenhua Ling Xie Chen Ya Li Zixing Zhang

This book constitutes the refereed proceedings of the 18th National Conference on Man-Machine Speech Communication, NCMMSC 2023, held in Suzhou, China, during December 8–11, 2023.The 20 full papers and 11 short papers included in this book were carefully reviewed and selected from 117 submissions. They deal with topics such as speech recognition, synthesis, enhancement and coding, audio/music/singing synthesis, avatar, speaker recognition and verification, human–computer dialogue systems, large language models as well as phonetic and linguistic topics such as speech prosody analysis, pathological speech analysis, experimental phonetics, acoustic scene classification.

Man-Machine Speech Communication: 17th National Conference, NCMMSC 2022, Hefei, China, December 15–18, 2022, Proceedings (Communications in Computer and Information Science #1765)

by Ling Zhenhua Gao Jianqing Yu Kai Jia Jia

This book constitutes the refereed proceedings of the 17th National Conference on Man–Machine Speech Communication, NCMMSC 2022, held in China, in December 2022.The 21 full papers and 7 short papers included in this book were carefully reviewed and selected from 108 submissions. They were organized in topical sections as follows: MCPN: A Multiple Cross-Perception Network for Real-Time Emotion Recognition in Conversation.- Baby Cry Recognition Based on Acoustic Segment Model, MnTTS2 An Open-Source Multi-Speaker Mongolian Text-to-Speech Synthesis Dataset.

Man-Made: How the bias of the past is being built into the future

by Tracey Spicer

Walkley Award-winning journalist Tracey Spicer exposes the next frontier of feminism. Man-Made aims to open readers&’ eyes to a transformative technological shift in society and give them the tools to make positive change. `Mum, I want a robot slave.&’ Broadcaster Tracey Spicer had an epiphany when her young son uttered these six words. Suddenly, her life&’s work fighting inequality seemed futile. What&’s the point in agitating to change the present, if bigotry is being embedded into our futures? And so began a quest to uncover who was responsible and hold them to account. Who is the ultimate villain? Big Tech, whose titans refuse to spend money to fix the problem? The world&’s politicians, who lack the will to legislate? Or should we all be walking into a hall of mirrors and taking a good, hard look at ourselves…? This is a deeply researched, illuminating and gripping ride into an uncertain future, culminating in a resounding call to action that will shake the tech sector to its foundations.Praise for Man-Made &‘Exhilarating … The book we need as we grapple with how AI will change our lives and our world.&’ Dame Quentin Bryce &‘Brilliant, hilarious and terrifying. You&’ll never see Alexa the same way again.&’ Juanita Phillips &‘Tracey Spicer uses her unmistakably human voice to warn us all about the deeply sexist Frankenstein&’s Monster that is modern AI.&’ Yumi Stynes

Man-Made Women: The Sexual Politics of Sex Dolls and Sex Robots (Social and Cultural Studies of Robots and AI)

by Kathleen Richardson Charlotta Odlind

This book presents a unique, feminist approach to ‘sex’ dolls and ‘sex’ robots, taking a critical look at the academic and business narratives that serve to rationalise them. As new forms of pornography (porn robots), this edited volume provides an urgent women’s centred critique. The emergence of ‘sex’ robots is situated within the wider context of the attack on women’s rights and the relentless rise of techno-pornography. As an outgrowth of the industries of prostitution, pornography and child sex abuse, these objects offer new ways to dehumanise women and girls. While support for ‘sex’ robots is positioned as progressive and emancipatory, the contributors in this volume argue they reduce women to consumable parts. They explore how law, the arts, ethics, economy, politics and culture are interconnected with harmful technological developments.

The Man Who Knew Too Much: Alan Turing and the Invention of the Computer (Great Discoveries)

by David Leavitt

A "skillful and literate" (New York Times Book Review) biography of the persecuted genius who helped create the modern computer. To solve one of the great mathematical problems of his day, Alan Turing proposed an imaginary computer. Then, attempting to break a Nazi code during World War II, he successfully designed and built one, thus ensuring the Allied victory. Turing became a champion of artificial intelligence, but his work was cut short. As an openly gay man at a time when homosexuality was illegal in England, he was convicted and forced to undergo a humiliating "treatment" that may have led to his suicide. With a novelist's sensitivity, David Leavitt portrays Turing in all his humanity--his eccentricities, his brilliance, his fatal candor--and elegantly explains his work and its implications.

Refine Search

Showing 32,601 through 32,625 of 54,275 results