Browse Results

Showing 13,026 through 13,050 of 54,051 results

Cyberemotions: Collective Emotions in Cyberspace (Understanding Complex Systems)

by Janusz A. Holyst

This is the first monograph of its kind introduces the reader to fundamental definitions, key concepts and case studies addressing the following *What are emotions? How do they emerge, and how are *How can we *What are *When do emotions and *How can we model emotions and their changes? *What role do emotions play in online Edited and authored by leading scientists in the field, this book serves as an introduction and reference resource for researchers working on applications of complex systems methods in the social sciences, as well for social scientists, psychologists, online-community experts and computer scientists. This book provides an excellent overview of the current state-of-art in research on collective emotional interactions mediated by the Internet. This fascinating interdisciplinary research field is shown from perspectives of social scientists, physicists, as well as specialists in data mining and information technology. The book introduces a reader in social phenomena occurring in cyberspace, algorithms needed for automatic sentiment detection and data driven modeling of emotional patterns observed in on-line groups. H. Eugene Stanley, Professor, Boston University We are what we communicate: communicare ergo sum! With the explosive hyper exponential growth of the internet suddenly new ways of communication are emerging that give rise to a digital 'Homo empathicus', each of us suddenly being able to share thoughts and feelings with millions if not billions of others. This book is a true treat, a timely milestone that gives us insight in the co-evolution of the way we interact with each other and the communication technology provided through this new seemingly endless flexible digital world. Prof. Holyst did a great job bringing together real experts in the field of cyber emotions, they give us a reflection of where we come from and, as important, they open up new vistas of where we are going. Peter M. A. Sloot, Professor, University of Amsterdam, the Netherlands, Nanyang University, Singapore The book Cyberemotions embraces the topic of emotion studies in cyberspace from a very rich spectrum of points of view and applications. It is particularly interesting reading the theoretical foundations underlying the concepts of Cyberemotions and how these concepts can be captured, modeled and implemented in real-time applications. Exploring collective emotions in online settings is extremely challenging and opens new directions of research. Catherine Pelachaud, Director of Research CNRS at LTCI, TELECOM ParisTech Logical machines give us a chance to analyze our often illogical behaviors, especially in the vast meadows of the cyberspace. In this important book, authors of different backgrounds present a wide and deep image, not only of methods of analyzing our emotional behavior online but also how the computers can help to break communicational walls the same technology had built. Rafał Rzepka, Professor, Hokkaido University

Cyberfeminism and Artificial Life

by Sarah Kember

Cyberfeminism and Artificial Life examines the construction, manipulation and re-definition of life in contemporary technoscientific culture. It takes a critical political view of the concept of life as information, tracing this through the new biology and the discourse of genomics as well as through the changing discipline of artificial life and its manifestation in art, language, literature, commerce and entertainment. From cloning to computer games, and incorporating an analysis of hardware, software and 'wetware', Sarah Kember extends current understanding by demonstrating the ways in which this relatively marginal field connects with, and connects up global networks of information systems.Ultimately, this book aims to re-focus concern on the ethics rather than on the 'nature' of life-as-it-could-be.

CyberForensics: Understanding Information Security Investigations (Springer’s Forensic Laboratory Science Series)

by Jennifer Bayuk

This fascinating and highly topical subject has a history dating back to the secret world of 1970s Cold War espionage, when the US military and Central intelligence agencies, aided by the latest mainframe systems, were the first to use computer forensics techniques in counterintelligence. In the decades since, cybercrime has emerged from the obscurity of low-level prosecution evidence to become a serious cross-border crime issue, while cyberforensic investigators have moved on from drug, murder, and child pornography crimes that were facilitated by computers, and are now tackling headline-grabbing cyber bank robbery, identity theft, and corporate spying. With little consensus as yet on the qualifications required to become a cyberforensic investigator, Cyberforensics: Understanding Information Security Investigations assembles the varying perspectives of pioneers and key figures in the field. All the authors have more than 10 years' experience in successfully investigating cybercrime, and some more than 20. Through real-life case studies the chapters introduce the reader to the field of cybersecurity, starting with corporate investigation, and progressing to analyze the issues in more detail. Taking us from accounting cyberforensics to unraveling the complexities of malware, the contributors explain the tools and techniques they use in a manner that allows us to map their methodology into a more generic understanding of what a cybersecurity investigation really is. Above all, Cyberforensics shows that there is a cohesive set of concepts that binds cybersecurity investigators to a shared vision. These core ideas are now gaining importance as a body of knowledge that cyberforensics professionals agree should be a prerequisite to the professional practice of information security.

Cyberformalism: Histories of Linguistic Forms in the Digital Archive

by Daniel Shore

A groundbreaking study of how abstract linguistic signs circulate in literature, intellectual history, and popular culture.Linguistic forms are essential to meaning: like words, they make a semantic contribution to the things we say. We inherit them from past writers and speakers and fill them with different words to produce novel utterances. They shape us and the ways we interpret the world. Yet prevalent assumptions about language and the constraints of print-finding tools have kept linguistic forms and their histories hidden from view. Drawing on recent work in cognitive and construction grammar along with tools and methods developed by corpus and computational linguists, Daniel Shore’s Cyberformalism represents a new way forward for digital humanities scholars seeking to understand the textual past. Championing a qualitative approach to digital archives, Shore uses the abstract pattern-matching capacities of search engines to explore precisely those combinatory aspects of language—word order, syntax, categorization—discarded by the "bag of words" quantitative methods that are dominant in the digital humanities. While scholars across the humanities have long explored the histories of words and phrases, Shore argues that increasingly sophisticated search tools coupled with growing full-text digital archives make it newly possible to study the histories of linguistic forms. In so doing, Shore challenges a range of received metanarratives and complicates some of the most basic concepts of literary study. Touching on canonical works by Shakespeare, Milton, Wordsworth, and Kant, even as it takes the full diversity of digitized texts as its purview, Cyberformalism asks scholars of literature, history, and culture to revise nothing less than their understanding of the linguistic sign.

Cybergefahr: Wie wir uns gegen Cyber-Crime und Online-Terror wehren können

by Eddy Willems

Man kann online wählen, Rechnungen bezahlen und Tickets kaufen - aber wie sicher ist das? Überall lauern Viren, Spam, Hackerangriffe und sogar Cyber-Spione. Wie kann man sich schützen und wie sollte man dem Phänomen Cyber-Crime begegnen? Der bekannte Security-Experte Eddy Willems gibt einen Überblick über Online-Gefahren und Möglichkeiten, sich vor ihnen zu schützen. Er erläutert spannend die Vergangenheit, Gegenwart und Zukunft des Cyber-Crime.

Cyberidentities: Canadian and European Presence in Cyberspace

by Leen D'Haenens

This innovative study explores diverse aspects of Canadian and European identity on the information highway and reaches beyond technical issues to confront and explore communication, culture and the culture of communication.

Cyberinsurance Policy: Rethinking Risk in an Age of Ransomware, Computer Fraud, Data Breaches, and Cyberattacks (Information Policy)

by Josephine Wolff

Why cyberinsurance has not improved cybersecurity and what governments can do to make it a more effective tool for cyber risk management.As cybersecurity incidents—ranging from data breaches and denial-of-service attacks to computer fraud and ransomware—become more common, a cyberinsurance industry has emerged to provide coverage for any resulting liability, business interruption, extortion payments, regulatory fines, or repairs. In this book, Josephine Wolff offers the first comprehensive history of cyberinsurance, from the early &“Internet Security Liability&” policies in the late 1990s to the expansive coverage offered today. Drawing on legal records, government reports, cyberinsurance policies, and interviews with regulators and insurers, Wolff finds that cyberinsurance has not improved cybersecurity or reduced cyber risks. Wolff examines the development of cyberinsurance, comparing it to other insurance sectors, including car and flood insurance; explores legal disputes between insurers and policyholders about whether cyber-related losses were covered under policies designed for liability, crime, or property and casualty losses; and traces the trend toward standalone cyberinsurance policies and government efforts to regulate and promote the industry. Cyberinsurance, she argues, is ineffective at curbing cybersecurity losses because it normalizes the payment of online ransoms, whereas the goal of cybersecurity is the opposite—to disincentivize such payments to make ransomware less profitable. An industry built on modeling risk has found itself confronted by new technologies before the risks posed by those technologies can be fully understood.

Cyberjutsu: Cybersecurity for the Modern Ninja

by Ben McCarty

Like Sun Tzu's Art of War for Modern Business, this book uses ancient ninja scrolls as the foundation for teaching readers about cyber-warfare, espionage and security.Cyberjutsu presents a practical cybersecurity field guide based on the techniques, tactics, and procedures (TTPs) of the ancient ninja. Author Ben McCarty, a cyber warfare specialist and former NSA developer, analyzes once-secret Japanese scrolls, drawing parallels to modern infosec concepts to provide unique insights on defensive and offensive security. He translates the training methodologies of Japan&’s most notorious covert agents—history&’s first advanced persistent threat (APT)—into highly effective practices for countering information warfare, espionage, supply-chain attacks, zero-day exploits, and more. Each chapter examines one TTP in detail—like assessing gaps in a target&’s defense, striking where the enemy is negligent, and mastering the art of invisibility—and explains what the concept can teach us about the current cybersecurity landscape. McCarty recommends in-depth mitigations and security controls, mapped to the NIST 800-53 standard, and a &“Castle Theory Thought Exercise&” that helps you apply the ancient lesson to protect your castle (network) from enemy ninja (cyber threat actors). You&’ll discover the effectiveness of ancient social engineering strategies and trap-based security controls; see why mapping your network like an adversary gives you the advantage; and apply lessons from old-world tools, like the &“ninja ladder,&” to prevent attacks. Topics also include: • Threat modeling, threat intelligence, and targeted controls • Countermeasures like network sensors, time-based controls, airgaps, and improved authentication protocols • Profiles of insider threats, and ways to recognize them in employees • Covert communication TTPs and their implications for malware command and control (C2) • Methods for detecting attackers, preventing supply-chain attacks, and defending against zero-day exploits In this book, you&’ll see the astonishing power of ninja information-gathering processes—and how adopting them just might be the key to innovating contemporary cybersecurity models.

Cyberlaw: The Law of the Internet and Information Technology

by Brian Craig

Featuring the most current exploration of cyberlaw, this book helps students understand the legal and policy issues associated with the Internet. Tackling a full range of legal topics, it includes discussion of jurisdiction, intellectual property, contracts, taxation, torts, computer crimes, online speech, defamation and privacy. <p><p>Chapters include recent, relevant cases, discussion questions and exercises at the end of each chapter. Using a consistent voice and clear explanations, the author covers the latest developments in cyberlaw-from cases to legislation to regulations.

Cyberliteracy: Navigating the Internet with Awareness

by Laura J. Gurak

For anyone who has ever felt bewildered, dismayed, or even infuriated by the Internet, this helpful book clearly explains computer communications and how to become literate in cyberspace. With lively stories and interesting case histories, Laura Gurak shows how to sort fact from fiction, detect hoaxes, identify advertising masquerading as product information, protect privacy, and contend with other critical issues related to the new language of the Internet.

Cybernetic Approach to Project Management

by Bogdan Lent

This book attempts to reflect the project reality as closely as possible, covering the ISO 21500:2012 standard that has just been introduced and the benefits from the best contributions worldwide and also providing the concise yet powerful tool box. It shall be easy to use and intuitively supportive of project managers. So far, evidence indicates that these targets are successfully met. One of its key recognitions, and in consequence a distinctive feature of this book, is the impact that the project manager's personality has on the fate of the project. The project manager's successful self-management in work & life and in leadership processes should be considered as important in any endeavor as all other project management processes, covered by the new standards and guidelines.

Cybernetic Architectures: Informational Thinking and Digital Design (Routledge Research in Architecture)

by Camilo Andrés Cifuentes Quin

For the past 50 years, the advancements of technology have equipped architects with unique tools that have enabled the development of new computer-mediated design methods, fabrication techniques, and architectural expressions. Simultaneously, in contemporary architecture new frameworks emerged that have radically redefined the traditional conceptions of design, of the built environment, and of the role of architects. Cybernetic Architectures argues that such frameworks have been constructed in direct reference to cybernetic thinking, a thought model that emerged concurrently with the origins of informatics and that embodies the main assumptions, values, and ideals underlying the development of computer science. The book explains how the evolution of the computational perspective in architecture has been parallel to the construction of design issues in reference to the central ideas fostered by the cybernetic model. It unpacks and explains this crucial relationship, in the work of digital architects, between the use of information technology in design and the conception of architectural problems around an informational ontology. This book will appeal to architecture students and scholars interested in understanding the recent transformations in the architectural landscape related to the advent of computer-based design paradigms.

Cybernetic Revolutionaries: Technology and Politics in Allende's Chile

by Eden Medina

A historical study of Chile's twin experiments with cybernetics and socialism, and what they tell us about the relationship of technology and politics.In Cybernetic Revolutionaries, Eden Medina tells the history of two intersecting utopian visions, one political and one technological. The first was Chile's experiment with peaceful socialist change under Salvador Allende; the second was the simultaneous attempt to build a computer system that would manage Chile's economy. Neither vision was fully realized—Allende's government ended with a violent military coup; the system, known as Project Cybersyn, was never completely implemented—but they hold lessons for today about the relationship between technology and politics.Drawing on extensive archival material and interviews, Medina examines the cybernetic system envisioned by the Chilean government—which was to feature holistic system design, decentralized management, human-computer interaction, a national telex network, near real-time control of the growing industrial sector, and modeling the behavior of dynamic systems. She also describes, and documents with photographs, the network's Star Trek-like operations room, which featured swivel chairs with armrest control panels, a wall of screens displaying data, and flashing red lights to indicate economic emergencies.Studying project Cybersyn today helps us understand not only the technological ambitions of a government in the midst of political change but also the limitations of the Chilean revolution. This history further shows how human attempts to combine the political and the technological with the goal of creating a more just society can open new technological, intellectual, and political possibilities. Technologies, Medina writes, are historical texts; when we read them we are reading history.

Cybernetic Revolutionaries

by Eden Medina

In Cybernetic Revolutionaries, Eden Medina tells the history of two intersecting utopian visions, one political and one technological. The first was Chile's experiment with peaceful socialist change under Salvador Allende; the second was the simultaneous attempt to build a computer system that would manage Chile's economy. Neither vision was fully realized--Allende's government ended with a violent military coup; the system, known as Project Cybersyn, was never completely implemented--but they hold lessons for today about the relationship between technology and politics. Drawing on extensive archival material and interviews, Medina examines the cybernetic system envisioned by the Chilean government--which was to feature holistic system design, decentralized management, human-computer interaction, a national telex network, near real-time control of the growing industrial sector, and modeling the behavior of dynamic systems. She also describes, and documents with photographs, the network's Star Trek-like operations room, which featured swivel chairs with armrest control panels, a wall of screens displaying data, and flashing red lights to indicate economic emergencies. Studying project Cybersyn today helps us understand not only the technological ambitions of a government in the midst of political change but also the limitations of the Chilean revolution. This history further shows how human attempts to combine the political and the technological with the goal of creating a more just society can open new technological, intellectual, and political possibilities. Technologies, Medina writes, are historical texts; when we read them we are reading history.

Cybernetical Intelligence: Engineering Cybernetics with Machine Intelligence

by Kelvin K. Wong

CYBERNETICAL INTELLIGENCE Highly comprehensive, detailed, and up-to-date overview of artificial intelligence and cybernetics, with practical examples and supplementary learning resources Cybernetical Intelligence: Engineering Cybernetics with Machine Intelligence is a comprehensive guide to the field of cybernetics and neural networks, as well as the mathematical foundations of these technologies. The book provides a detailed explanation of various types of neural networks, including feedforward networks, recurrent neural networks, and convolutional neural networks as well as their applications to different real-world problems. This groundbreaking book presents a pioneering exploration of machine learning within the framework of cybernetics. It marks a significant milestone in the field’s history, as it is the first book to describe the development of machine learning from a cybernetics perspective. The introduction of the concept of “Cybernetical Intelligence” and the generation of new terminology within this context propel new lines of thought in the historical development of artificial intelligence. With its profound implications and contributions, this book holds immense importance and is poised to become a definitive resource for scholars and researchers in this field of study. Each chapter is specifically designed to introduce the theory with several examples. This comprehensive book includes exercise questions at the end of each chapter, providing readers with valuable opportunities to apply and strengthen their understanding of cybernetical intelligence. To further support the learning journey, solutions to these questions are readily accessible on the book’s companion site. Additionally, the companion site offers programming practice exercises and assignments, enabling readers to delve deeper into the practical aspects of the subject matter. Cybernetical Intelligence includes information on: The history and development of cybernetics and its influence on the development of neural networks Developments and innovations in artificial intelligence and machine learning, such as deep reinforcement learning, generative adversarial networks, and transfer learning Mathematical foundations of artificial intelligence and cybernetics, including linear algebra, calculus, and probability theory Ethical implications of artificial intelligence and cybernetics as well as responsible and transparent development and deployment of AI systems Presenting a highly detailed and comprehensive overview of the field, with modern developments thoroughly discussed, Cybernetical Intelligence is an essential textbook that helps students make connections with real-life engineering problems by providing both theory and practice, along with a myriad of helpful learning aids.

Cybernetics: From Past to Future (Studies in Systems, Decision and Control #47)

by D. A. Novikov

This book is a concise navigator across the history of cybernetics, itsstate-of-the-art and prospects. The evolution of cybernetics (from N. Wiener tothe present day) and the reasons of its ups and downs are presented. Thecorrelation of cybernetics with the philosophy and methodology of control, aswell as with system theory and systems analysis is clearly demonstrated. The book presents a detailed analysis focusing on the modern trends ofresearch in cybernetics. A new development stage of cybernetics (the so-calledcybernetics 2. 0) is discussed as a science on general regularities of systemsorganization and control. The author substantiates the topicality ofelaborating a new branch of cybernetics, i. e. organization theory which studiesan organization as a property, process and system. The book is intended for theoreticians andpractitioners, as well as for students, postgraduates and doctoral candidates. In the first place, the target audience includes tutors and lecturers preparingcourses on cybernetics, control theory and systems science.

Cybernetics 2.0: A General Theory of Adaptivity and Homeostasis in the Brain and in the Body (Springer Series on Bio- and Neurosystems #14)

by Bernard Widrow

This book takes the notions of adaptivity and learning from the realm of engineering into the realm of biology and natural processes. It introduces a Hebbian-LMS algorithm, an integration of unsupervised Hebbian learning and supervised LMS learning in neural networks, as a mathematical representation of a general theory for synaptic learning in the brain, and adaptation and functional control of homeostasis in living systems. Written in a language that is able to address students and scientists with different backgrounds, this book accompanies readers on a unique journey through various homeostatic processes in living organisms, such as body temperature control and synaptic plasticity, explaining how the Hebbian-LMS algorithm can help understand them, and suggesting some open questions for future research. It also analyses cell signalling pathways from an unusual perspective, where hormones and hormone receptors are shown to be regulated via the principles of the Hebbian-LMS algorithm. It further discusses addiction and pain, and various kinds of mood disorders alike, showing how they can be modelled with the Hebbian-LMS algorithm. For the first time, the Hebbian-LMS algorithm, which has been derived from a combination of Hebbian theory from the neuroscience field and the LMS algorithm from the engineering field of adaptive signal processing, becomes a potent model for understanding how biological regulation works. Thus, this book is breaking new ground in neuroscience by providing scientists with a general theory for how nature does control synaptic learning. It then goes beyond that, showing that the same principles apply to hormone-mediated regulation of physiological processes. In turn, the book tackles in more depth the concept of learning. It covers computer simulations and strategies for training neural networks with the Hebbian-LMS algorithm, demonstrating that the resulting algorithms are able to identify relationships between unknown input patterns. It shows how this can translate in useful ideas to understand human memory and design cognitive structures. All in all, this book offers an absolutely, unique, inspiring reading for biologists, physiologists, and engineers, paving the way for future studies on what we could call the nature’s secret learning algorithm.

Cybernetics and Algorithms in Intelligent Systems: Proceedings Of 7th Computer Science On-line Conference 2018, Volume 3 (Advances In Intelligent Systems And Computing #765)

by Radek Silhavy

This book presents new approaches and methods applied to real-world problems, and in particular, exploratory research relating to novel approaches in the field of cybernetics and automation control theory. Particularly focusing on modern trends in selected fields of interest, it presents new algorithms and methods in intelligent systems in cybernetics. This book constitutes the third volume of the refereed proceedings of the Cybernetics and Algorithms in Intelligent Systems Section of the 7th Computer Science On-line Conference 2018 (CSOC 2018), held online in April 2018.

Cybernetics and Applied Systems

by Constantin Virgil Negoita

In light of the enormous interest in building intelligent systems, this volume blends theory, applications, and methodology of cybernetics taking it out of the realm of the abstract and explaining how cybernetics can contribute to an improved understanding of intelligence. Among the topics of the 17

Cybernetics and Automation Control Theory Methods in Intelligent Algorithms: Proceedings of 8th Computer Science On-line Conference 2019, Vol. 3 (Advances in Intelligent Systems and Computing #986)

by Radek Silhavy

This book discusses novel intelligent-system algorithms and methods in cybernetics, presenting new approaches in the field of cybernetics and automation control theory. It constitutes the proceedings of the Cybernetics and Automation Control Theory Methods in Intelligent Algorithms Section of the 8th Computer Science On-line Conference 2019 (CSOC 2019), held on-line in April 2019.

Cybernetics and Mathematics Applications in Intelligent Systems: Proceedings of the 6th Computer Science On-line Conference 2017 (CSOC2017), Vol 2 (Advances in Intelligent Systems and Computing #574)

by Radek Silhavy Roman Senkerik Zuzana Kominkova Oplatkova Petr Silhavy Zdenka Prokopova

This book presents new methods for and approaches to real-world problems as well as exploratory research describing novel mathematics and cybernetics applications in intelligent systems. It focuses on modern trends in selected fields of technological systems and automation control theory. It also introduces new algorithms, methods and applications of intelligent systems in automation, technological and industrial applications. This book constitutes the refereed proceedings of the Cybernetics and Mathematics Applications in Intelligent Systems Section of the 6th Computer Science On-line Conference 2017 (CSOC 2017), held in April 2017.

Cybernetics and Systems: Social and Business Decisions (Routledge-Giappichelli Systems Management)

by Sergio Barile Raul Espejo Igor Perko Marialuisa Saviano

Society is now facing challenges for which the traditional management toolbox is increasingly inadequate. Well-grounded theoretical frameworks, such as systems thinking and cybernetics, offer general level interpretation schemes and models that are capable of supporting understanding of complex phenomena and are not impacted by the passage of time. This book serves the knowledge society to address the complexity of decision making and problem solving in the 21st century with contributions from systems and cybernetics. A multi-disciplinary approach has been adopted to support diversity and to develop inter- and trans-disciplinary knowledge within the shared thematic of problem solving and decision making in the 21st century. Its conceptual thread is cyber/systemic thinking, and its realisation is supported by a wide network of scientists on the basis of a highly participative agenda. The book provides a platform of knowledge sharing and conceptual frameworks developed with multi-disciplinary perspectives, which are useful to better understand the fast changing scenario and the complexity of problem solving in the present time.

Cybernetics Approaches in Intelligent Systems: Computational Methods in Systems and Software 2017, vol. 1 (Advances in Intelligent Systems and Computing #661)

by Radek Silhavy Petr Silhavy Zdenka Prokopova

This book discusses new approaches and methods in the cybernetics, algorithms and software engineering in the scope of the intelligent systems. It brings new approaches and methods to real-world problems and exploratory research that describes novel approaches in the cybernetics, algorithms and software engineering in the scope of the intelligent systems. This book constitutes the refereed proceedings of the Computational Methods in Systems and Software 2017, a conference that provided an international forum for the discussion of the latest high-quality research results in all areas related to computational methods, statistics, cybernetics and software engineering.

Cybernetics, Cognition and Machine Learning Applications: Proceedings of ICCCMLA 2020 (Algorithms for Intelligent Systems)

by Vinit Kumar Gunjan P. N. Suganthan Jan Haase Amit Kumar

This book includes the original, peer reviewed research articles from the 2nd International Conference on Cybernetics, Cognition and Machine Learning Applications (ICCCMLA 2020), held in August, 2020 at Goa, India. It covers the latest research trends or developments in areas of data science, artificial intelligence, neural networks, cognitive science and machine learning applications, cyber physical systems and cybernetics.

Cybernetics, Cognition and Machine Learning Applications: Proceedings of ICCCMLA 2021 (Algorithms for Intelligent Systems)

by Vinit Kumar Gunjan P. N. Suganthan Jan Haase Amit Kumar

This book includes the original, peer-reviewed research articles from the 3rd International Conference on Cybernetics, Cognition and Machine Learning Applications (ICCCMLA 2021), held in August 21 – 22, 2021, at Goa, India. It covers the latest research trends or developments in areas of data science, artificial intelligence, neural networks, cognitive science and machine learning applications, cyber physical systems and cybernetics.

Refine Search

Showing 13,026 through 13,050 of 54,051 results