- Table View
- List View
This clearly-structured, classroom-tested textbook/reference presents a methodical introduction to the field of CI. Providing an authoritative insight into all that is necessary for the successful application of CI methods, the book describes fundamental concepts and their practical implementations, and explains the theoretical background underpinning proposed solutions to common problems. Only a basic knowledge of mathematics is required. Features: provides electronic supplementary material at an associated website, including module descriptions, lecture slides, exercises with solutions, and software tools; contains numerous examples and definitions throughout the text; presents self-contained discussions on artificial neural networks, evolutionary algorithms, fuzzy systems and Bayesian networks; covers the latest approaches, including ant colony optimization and probabilistic graphical models; written by a team of highly-regarded experts in CI, with extensive experience in both academia and industry.
The practical benefits of computational logic need not be limited to mathematics and computing. As this book shows, ordinary people in their everyday lives can profit from the recent advances that have been developed for artificial intelligence. The book draws upon related developments in various fields from philosophy to psychology and law. It pays special attention to the integration of logic with decision theory, and the use of logic to improve the clarity and coherence of communication in natural languages such as English. This book is essential reading for teachers and researchers who may be out of touch with the latest developments in computational logic. It will also be useful in any undergraduate course that teaches practical thinking, problem solving or communication skills. Its informal presentation makes the book accessible to readers from any background, but optional, more formal, chapters are also included for those who are more technically oriented.
This must-read text presents the pioneering work of the late Professor Jacob (Jack) T. Schwartz on computational logic and set theory and its application to proof verification techniques, culminating in the ÆtnaNova system, a prototype computer program designed to verify the correctness of mathematical proofs presented in the language of set theory. Topics and features: describes in depth how a specific first-order theory can be exploited to model and carry out reasoning in branches of computer science and mathematics; presents an unique system for automated proof verification in large-scale software systems; integrates important proof-engineering issues, reflecting the goals of large-scale verifiers; includes an appendix showing formalized proofs of ordinals, of various properties of the transitive closure operation, of finite and transfinite induction principles, and of Zorn's lemma.
Biometrics, the science of using physical traits to identify individuals, is playing an increasing role in our security-conscious society and across the globe. Biometric authentication, or bioauthentication, systems are being used to secure everything from amusement parks to bank accounts to military installations. Yet developments in this field have not been matched by an equivalent improvement in the statistical methods for evaluating these systems. Compensating for this need, this unique text/reference provides a basic statistical methodology for practitioners and testers of bioauthentication devices, supplying a set of rigorous statistical methods for evaluating biometric authentication systems. This framework of methods can be extended and generalized for a wide range of applications and tests. This is the first single resource on statistical methods for estimation and comparison of the performance of biometric authentication systems. The book focuses on six common performance metrics: for each metric, statistical methods are derived for a single system that incorporates confidence intervals, hypothesis tests, sample size calculations, power calculations and prediction intervals. These methods are also extended to allow for the statistical comparison and evaluation of multiple systems for both independent and paired data. Topics and features: * Provides a statistical methodology for the most common biometric performance metrics: failure to enroll (FTE), failure to acquire (FTA), false non-match rate (FNMR), false match rate (FMR), and receiver operating characteristic (ROC) curves * Presents methods for the comparison of two or more biometric performance metrics * Introduces a new bootstrap methodology for FMR and ROC curve estimation * Supplies more than 120 examples, using publicly available biometric data where possible * Discusses the addition of prediction intervals to the bioauthentication statistical toolset * Describes sample-size and power calculations for FTE, FTA, FNMR and FMR Researchers, managers and decisions makers needing to compare biometric systems across a variety of metrics will find within this reference an invaluable set of statistical tools. Written for an upper-level undergraduate or master's level audience with a quantitative background, readers are also expected to have an understanding of the topics in a typical undergraduate statistics course. Dr. Michael E. Schuckers is Associate Professor of Statistics at St. Lawrence University, Canton, NY, and a member of the Center for Identification Technology Research.
Computational modeling is emerging as a powerful new approach to study and manipulate biological systems. Multiple methods have been developed to model, visualize, and rationally alter systems at various length scales, starting from molecular modeling and design at atomic resolution to cellular pathways modeling and analysis. Higher time and length scale processes, such as molecular evolution, have also greatly benefited from new breeds of computational approaches. This book provides an overview of the established computational methods used for modeling biologically and medically relevant systems.
Senior level/graduate level text/reference presenting state-of-the- art numerical techniques to solve the wave equation in heterogeneous fluid-solid media. Numerical models have become standard research tools in acoustic laboratories, and thus computational acoustics is becoming an increasingly important branch of ocean acoustic science. The first edition of this successful book, written by the recognized leaders of the field, was the first to present a comprehensive and modern introduction to computational ocean acoustics accessible to students. This revision, with 100 additional pages, completely updates the material in the first edition and includes new models based on current research. It includes problems and solutions in every chapter, making the book more useful in teaching (the first edition had a separate solutions manual). The book is intended for graduate and advanced undergraduate students of acoustics, geology and geophysics, applied mathematics, ocean engineering or as a reference in computational methods courses, as well as professionals in these fields, particularly those working in government (especially Navy) and industry labs engaged in the development or use of propagating models.
Computational Optimization of Internal Combustion Engines presents the state of the art of computational models and optimization methods for internal combustion engine development using multi-dimensional computational fluid dynamics (CFD) tools and genetic algorithms. Strategies to reduce computational cost and mesh dependency are discussed, as well as regression analysis methods. Several case studies are presented in a section devoted to applications, including assessments of: spark-ignition engines,dual-fuel engines,heavy duty and light duty diesel engines.Through regression analysis, optimization results are used to explain complex interactions between engine design parameters, such as nozzle design, injection timing, swirl, exhaust gas recirculation, bore size, and piston bowl shape. Computational Optimization of Internal Combustion Engines demonstrates that the current multi-dimensional CFD tools are mature enough for practical development of internal combustion engines. It is written for researchers and designers in mechanical engineering and the automotive industry.
A comprehensive manual on the efficient modeling and analysis of photonic devices through building numerical codes, this book provides graduate students and researchers with the theoretical background and MATLAB programs necessary for them to start their own numerical experiments. Beginning by summarizing topics in optics and electromagnetism, the book discusses optical planar waveguides, linear optical fiber, the propagation of linear pulses, laser diodes, optical amplifiers, optical receivers, finite-difference time-domain method, beam propagation method and some wavelength division devices, solitons, solar cells and metamaterials. Assuming only a basic knowledge of physics and numerical methods, the book is ideal for engineers, physicists and practising scientists. It concentrates on the operating principles of optical devices, as well as the models and numerical methods used to describe them.
Social networks provide a powerful abstraction of the structure and dynamics of diverse kinds of people or people-to-technology interaction. Web 2.0 has enabled a new generation of web-based communities, social networks, and folksonomies to facilitate collaboration among different communities. This unique text/reference compares and contrasts the ethological approach to social behavior in animals with web-based evidence of social interaction, perceptual learning, information granulation, the behavior of humans and affinities between web-based social networks. An international team of leading experts present the latest advances of various topics in intelligent-social-networks and illustrates how organizations can gain competitive advantages by applying the different emergent techniques in real-world scenarios. The work incorporates experience reports, survey articles, and intelligence techniques and theories with specific network technology problems. Topics and Features: Provides an overview social network tools, and explores methods for discovering key players in social networks, designing self-organizing search systems, and clustering blog sites, surveys techniques for exploratory analysis and text mining of social networks, approaches to tracking online community interaction, and examines how the topological features of a system affects the flow of information, reviews the models of network evolution, covering scientific co-citation networks, nature-inspired frameworks, latent social networks in e-Learning systems, and compound communities, examines the relationship between the intent of web pages, their architecture and the communities who take part in their usage and creation, discusses team selection based on members' social context, presents social network applications, including music recommendation and face recognition in photographs, explores the use of social networks in web services that focus on the discovery stage in the life cycle of these web services. This useful and comprehensive volume will be indispensible to senior undergraduate and postgraduate students taking courses in Social Intelligence, as well as to researchers, developers, and postgraduates interested in intelligent-social-networks research and related areas.
This book is the second of three volumes that illustrate the concept of social networks from a computational point of view. The book contains contributions from a international selection of world-class experts, concentrating on topics relating to security and privacy (the other two volumes review Tools, Perspectives, and Applications, and Mining and Visualization in CSNs). Topics and features: presents the latest advances in security and privacy issues in CSNs, and illustrates how both organizations and individuals can be protected from real-world threats; discusses the design and use of a wide range of computational tools and software for social network analysis; describes simulations of social networks, and the representation and analysis of social networks, with a focus on issues of security, privacy, and anonymization; provides experience reports, survey articles, and intelligence techniques and theories relating to specific problems in network technology.
This book is the first of three volumes that illustrate the concept of social networks from a computational point of view. The book contains contributions from a international selection of world-class experts, with a specific focus on practical tools, applications, and open avenues for further research (the other two volumes review issues of Security and Privacy, and Mining and Visualization in CSNs). Topics and features: presents the latest advances in CSNs, and illustrates how organizations can gain a competitive advantage by applying these ideas in real-world scenarios; discusses the design and use of a wide range of computational tools and software for social network analysis; describes simulations of social networks, the representation and analysis of social networks, and the use of semantic networks in knowledge discovery and visualization; provides experience reports, survey articles, and intelligence techniques and theories relating to specific problems in network technology.
The increased level of activity on structural health monitoring (SHM) in various universities and research labs has resulted in the development of new methodologies for both identifying the existing damage in structures and predicting the onset of damage that may occur during service. Designers often have to consult a variety of textbooks, journal papers and reports, because many of these methodologies require advanced knowledge of mechanics, dynamics, wave propagation, and material science. Computational Techniques for Structural Health Monitoring gives a one-volume, in-depth introduction to the different computational methodologies available for rapid detection of flaws in structures. Techniques, algorithms and results are presented in a way that allows their direct application. A number of case studies are included to highlight further the practical aspects of the selected topics. Computational Techniques for Structural Health Monitoring also provides the reader with numerical simulation tools that are essential to the development of novel algorithms for the interpretation of experimental measurements, and for the identification of damage and its characterization. Upon reading Computational Techniques for Structural Health Monitoring, graduate students will be able to begin research-level work in the area of structural health monitoring. The level of detail in the description of formulation and implementation also allows engineers to apply the concepts directly in their research.
Despite a strong commitment to delivering quality health care, persistent problems involving medical errors and ineffective treatment continue to plague the industry. Many of these problems are the consequence of poor information and technology (IT) capabilities, and most importantly, the lack cognitive IT support. Clinicians spend a great deal of time sifting through large amounts of raw data, when, ideally, IT systems would place raw data into context with current medical knowledge to provide clinicians with computer models that depict the health status of the patient. Computational Technology for Effective Health Care advocates re-balancing the portfolio of investments in health care IT to place a greater emphasis on providing cognitive support for health care providers, patients, and family caregivers; observing proven principles for success in designing and implementing IT; and accelerating research related to health care in the computer and social sciences and in health/biomedical informatics. Health care professionals, patient safety advocates, as well as IT specialists and engineers, will find this book a useful tool in preparation for crossing the health care IT chasm.
Compute-IT will help you deliver innovative lessons for the new Key Stage 3 Computing curriculum with confidence, using resources and meaningful assessment produced by expert educators. With Compute-IT you will be able to assess and record students' attainment and monitor progression all the way through to Key Stage 4. Developed by members of Computing at School, the national subject association for Computer Science, and a team of Master Teachers who deliver CPD through the Network of Excellence project funded by the Department for Education, Compute-IT provides a cohesive and supportive learning package structured around the key strands of Computing. Creative and flexible in its approach, Compute-IT makes Computing for Key Stage 3 easy to teach, and fun and meaningful to learn, so you can: Follow well-structured and finely paced lessons along a variety of suggested routes through Key Stage 3 Deliver engaging and interesting lessons using a range of files and tutorials provided for a range of different programming languages Ensure progression throughout Key Stage 3 with meaningful tasks underpinned by unparalleled teacher and student support Assess students' work with confidence, using ready-prepared formative and summative tasks that are mapped to meaningful learning outcomes and statements in the new Programme of Study Creative and flexible in its approach, Compute-IT makes Computing for Key Stage 3 easy to teach, and fun and meaningful to learn. This is the first title in the Compute-IT course, which comprises three Student's Books, three Teacher Packs and a range of digital teaching and learning resources delivered through Dynamic Learning.
Campbell-Kelly (University of Warwick) and Aspray (Indiana University) describe the way computing was handled before the arrival of electronic computers, and recount the development of the mainframe computer. They review the origins of office machinery, early failed attempts to build a calculating engine, scientific war programs, the IBM system/360 family of computers, and the importance of real time for common commercial applications. The second edition expands the later sections on CD-ROMs, the internet, and web commerce. Annotation ©2004 Book News, Inc. , Portland, OR (booknews. com)
Computer: A History of the Information Machine, Second Edition traces the story of the computer, and shows how business and government were the first to explore its unlimited, information-processing potential. Old-fashioned entrepreneurship combined with scientific know-how inspired now famous computer engineers to create the technology that became IBM. Wartime needs drove the giant ENIAC, the first fully electronic computer. Later, the PC enabled modes of computing that liberated people from room-sized, mainframe computers. This second edition now extends beyond the development of Microsoft Windows and the Internet, to include open source operating systems like Linux, and the rise again and fall and potential rise of the dot.com industries.
Computer: A History of the Information Machine traces the history of the computer and shows how business and government were the first to explore its unlimited, information-processing potential. Old-fashioned entrepreneurship combined with scientific know-how inspired now famous computer engineers to create the technology that became IBM. Wartime needs drove the giant ENIAC, the first fully electronic computer. Later, the PC enabled modes of computing that liberated people from room-sized, mainframe computers.This third edition provides updated analysis on software and computer networking, including new material on the programming profession, social networking, and mobile computing. It expands its focus on the IT industry with fresh discussion on the rise of Google and Facebook as well as how powerful applications are changing the way we work, consume, learn, and socialize. Computer is an insightful look at the pace of technological advancement and the seamless way computers are integrated into the modern world. Through comprehensive history and accessible writing, Computer is perfect for courses on computer history, technology history, and information and society, as well as a range of courses in the fields of computer science, communications, sociology, and management.
Computer-Aided Design of User Interfaces VI gathers the latest experience of experts, research teams and leading organisations involved in computer-aided design of user interactive applications. This area investigates how it is desirable and possible to support, to facilitate and to speed up the development life cycle of any interactive system: requirements engineering, early-stage design, detailed design, deelopment, deployment, evaluation, and maintenance. In particular, it stresses how the design activity could be better understood for different types of advanced interactive ubiquitous computing, and multi-device environments.
become superhuman." -Richard B. Lanza, President, Cash Recovery Partners, LLC "Computer-Aided Fraud Prevention and Detection: A Step-by-Step Guide helps management and auditors answer T. S. Eliot's timeless question, 'Where is the knowledge lost in information?' Data analysis provides a means to mine the knowledge hidden in our information. Dave Coderre has long been a leader in educating auditors and others about Computer Assisted Audit Techniques. The book combines practical approaches with unique data analysis case examples that compel the readers to try the techniques themselves." -Courtenay Thompson Jr. Consultant, Courtenay Thompson & Associates
A systematic computer-aided approach provides a versatile setting for the control engineer to overcome the complications of controller design for highly nonlinear systems. Computer-aided Nonlinear Control System Design provides such an approach based on the use of describing functions. The text deals with a large class of nonlinear systems without restrictions on the system order, the number of inputs and/or outputs or the number, type or arrangement of nonlinear terms. The strongly software-oriented methods detailed facilitate fulfillment of tight performance requirements and help the designer to think in purely nonlinear terms, avoiding the expedient of linearization which can impose substantial and unrealistic model limitations and drive up the cost of the final product. Design procedures are presented in a step-by-step algorithmic format each step being a functional unit with outputs that drive the other steps. This procedure may be easily implemented on a digital computer with example problems from mechatronic and aerospace design being used to demonstrate the techniques discussed. The author's commercial MATLAB®-based environment, available separately from insert URL here, can be used to create simulations showing the results of using the computer-aided control system design ideas characterized in the text. Academic researchers and graduate students studying nonlinear control systems and control engineers dealing with nonlinear plant, particularly mechatronic or aerospace systems will find Computer-aided Nonlinear Control System Design to be of great practical assistance adding to their toolbox of techniques for dealing with system nonlinearities. A basic knowledge of calculus, nonlinear analysis and software engineering will enable the reader to get the best from this book.
Lynne Bowker introduces the world of technology to the world of translation in this unique book, the first of its kind. Bowker reveals the role of technology in translation and how to use this ever developing tool.
This book provides a broad survey of advanced pattern recognition techniques for human behavior analysis. Clearly structured, the book begins with concise coverage of the major concepts, before introducing the most frequently used techniques and algorithms in detail, and then discussing examples of real applications. Features: contains contributions from an international selection of experts in the field; presents a thorough introduction to the fundamental topics of human behavior analysis; investigates methods for activity recognition, including gait and posture analysis, hand gesture analysis, and semantics of human behavior in image sequences; provides an accessible psychological treatise on social signals for the analysis of social behaviors; discusses voice and speech analysis, combined audiovisual cues, and social interactions and group dynamics; examines applications in different research fields; each chapter concludes with review questions, a summary of the topics covered, and a glossary.
Information technology is the enabling foundation for all of human activity at the beginning of the 21st century, and advances in this area are crucial to all of us. These advances are taking place all over the world and can only be followed and perceived when researchers from all over the world assemble, and exchange their ideas in conferences such as the one presented in this proceedings volume regarding the 26th International Symposium on Computer and Information Systems, held at the Royal Society in London on 26th to 28th September 2011. Computer and Information Sciences II contains novel advances in the state of the art covering applied research in electrical and computer engineering and computer science, across the broad area of information technology. It provides access to the main innovative activities in research across the world, and points to the results obtained recently by some of the most active teams in both Europe and Asia.
Explains how computer animation is used to make entire films, indicates how it differs from traditional animation, and includes information on the development of that technology.
This book lays out the concepts necessary to understand how a computer works.For reasons of clarity, the authors have deliberately chosen examples that apply to machines from all eras, without having to water down the contents of the book. This choice helps to show how techniques, concepts and performances have evolved since the first computers.The book is divided into five parts. The first four, which are of increasing difficulty, are the core of the book: "Elements of a Basic Architecture", "Programming Model and Operation", "Memory Hierarchy", "Parallelism and Performance Enhancement". The final part provides hints and solutions to the exercises in the book as well as appendices. The reader may approach each part independently based on their prior knowledge and goals.
Select your format based upon: 1) how you want to read your book, and 2) compatibility with your reading tool. To learn more about using Bookshare with your device, visit the "Using Bookshare" page in the Help Center.
Here is an overview of the specialized formats that Bookshare offers its members with links that go to the Help Center for more information.
- Bookshare Web Reader - a customized reading tool for Bookshare members offering all the features of DAISY with a single click of the "Read Now" link.
- DAISY (Digital Accessible Information System) - a digital book file format. DAISY books from Bookshare are DAISY 3.0 text files that work with just about every type of access technology that reads text. Books that contain images will have the download option of ‘DAISY Text with Images’.
- BRF (Braille Refreshable Format) - digital Braille for use with refreshable Braille devices and Braille embossers.
- MP3 (Mpeg audio layer 3) - Provides audio only with no text. These books are created with a text-to-speech engine and spoken by Kendra, a high quality synthetic voice from Ivona. Any device that supports MP3 playback is compatible.
- DAISY Audio - Similar to the Daisy 3.0 option above; however, this option uses MP3 files created with our text-to-speech engine that utilizes Ivona's Kendra voice. This format will work with Daisy Audio compatible players such as Victor Reader Stream and Read2Go.