Browse Results

Showing 30,151 through 30,175 of 61,748 results

Intelligent and Fuzzy Systems: Intelligent Industrial Informatics and Efficient Networks Proceedings of the INFUS 2024 Conference, Volume 1 (Lecture Notes in Networks and Systems #1088)

by Cengiz Kahraman Selcuk Cebi Sezi Cevik Onar Basar Oztaysi Irem Ucal Sari A. Cagrı Tolga

This book presents recent research in intelligent and fuzzy techniques on Intelligent Industrial Informatics and Efficient Networks. This cutting-edge field integrates advanced technologies, such as artificial intelligence, machine learning and data analytics, into industrial processes, revolutionizing the way industries operate. The book presents the examples of the implementation of smart sensors and IoT devices, which facilitate real-time data collection and communication. High-speed, low-latency networks ensure that information flows effortlessly between devices, enabling timely responses and enabling the coordination of complex manufacturing processes. This network architecture supports the integration of edge computing, where data processing occurs closer to the source, reducing latency and enabling faster decision-making. The readers can benefit from this book for maintaining a leadership position among competitors in both manufacturing and service companies. The intended readers are intelligent and fuzzy systems researchers, lecturers, M.Sc. and Ph.D. students studying intelligent and fuzzy techniques. The book covers fuzzy logic theory and applications, heuristics and metaheuristics from optimization to machine learning, from quality management to risk management, making the book an excellent source for researchers.

Intelligent and Fuzzy Systems: Intelligent Industrial Informatics and Efficient Networks Proceedings of the INFUS 2024 Conference, Volume 2 (Lecture Notes in Networks and Systems #1089)

by Cengiz Kahraman Selcuk Cebi Sezi Cevik Onar Basar Oztaysi Irem Ucal Sari A. Cagrı Tolga

This book presents recent research in intelligent and fuzzy techniques on Intelligent Industrial Informatics and Efficient Networks. This cutting-edge field integrates advanced technologies, such as artificial intelligence, machine learning and data analytics, into industrial processes, revolutionizing the way industries operate. The book presents the examples of the implementation of smart sensors and IoT devices, which facilitate real-time data collection and communication. High-speed, low-latency networks ensure that information flows effortlessly between devices, enabling timely responses and enabling the coordination of complex manufacturing processes. This network architecture supports the integration of edge computing, where data processing occurs closer to the source, reducing latency and enabling faster decision-making. The readers can benefit from this book for maintaining a leadership position among competitors in both manufacturing and service companies. The intended readers are intelligent and fuzzy systems researchers, lecturers, M.Sc. and Ph.D. students studying intelligent and fuzzy techniques. The book covers fuzzy logic theory and applications, heuristics and metaheuristics from optimization to machine learning, from quality management to risk management, making the book an excellent source for researchers.

Intelligent and Fuzzy Systems: Intelligent Industrial Informatics and Efficient Networks Proceedings of the INFUS 2024 Conference, Volume 3 (Lecture Notes in Networks and Systems #1090)

by Cengiz Kahraman Selcuk Cebi Sezi Cevik Onar Basar Oztaysi Irem Ucal Sari A. Cagrı Tolga

This book presents recent research in intelligent and fuzzy techniques on Intelligent Industrial Informatics and Efficient Networks. This cutting-edge field integrates advanced technologies, such as artificial intelligence, machine learning and data analytics, into industrial processes, revolutionizing the way industries operate. The book presents the examples of the implementation of smart sensors and IoT devices, which facilitate real-time data collection and communication. High-speed, low-latency networks ensure that information flows effortlessly between devices, enabling timely responses and enabling the coordination of complex manufacturing processes. This network architecture supports the integration of edge computing, where data processing occurs closer to the source, reducing latency and enabling faster decision-making. The readers can benefit from this book for maintaining a leadership position among competitors in both manufacturing and service companies. The intended readers are intelligent and fuzzy systems researchers, lecturers, M.Sc. and Ph.D. students studying intelligent and fuzzy techniques. The book covers fuzzy logic theory and applications, heuristics and metaheuristics from optimization to machine learning, from quality management to risk management, making the book an excellent source for researchers.

Intelligent and Fuzzy Techniques for Emerging Conditions and Digital Transformation: Proceedings of the INFUS 2021 Conference, held August 24-26, 2021. Volume 1 (Lecture Notes in Networks and Systems #307)

by Cengiz Kahraman Selcuk Cebi Sezi Cevik Onar Basar Oztaysi A. Cagri Tolga Irem Ucal Sari

This book presents recent research in intelligent and fuzzy techniques. Emerging conditions such as pandemic, wars, natural disasters and various high technologies force people for significant changes in business and social life. The adoption of digital technologies to transform services or businesses, through replacing non-digital or manual processes with digital processes or replacing older digital technology with newer digital technologies through intelligent systems is the main scope of this book. It focuses on revealing the reflection of digital transformation in our business and social life under emerging conditions through intelligent and fuzzy systems. The latest intelligent and fuzzy methods and techniques on digital transformation are introduced by theory and applications. The intended readers are intelligent and fuzzy systems researchers, lecturers, M.Sc. and Ph.D. students studying digital transformation. Usage of ordinary fuzzy sets and their extensions, heuristics and metaheuristics from optimization to machine learning, from quality management to risk management makes the book an excellent source for researchers.

Intelligent and Fuzzy Techniques for Emerging Conditions and Digital Transformation: Proceedings of the INFUS 2021 Conference, held August 24-26, 2021. Volume 2 (Lecture Notes in Networks and Systems #308)

by Cengiz Kahraman Selcuk Cebi Sezi Cevik Onar Basar Oztaysi A. Cagri Tolga Irem Ucal Sari

This book presents recent research in intelligent and fuzzy techniques. Emerging conditions such as pandemic, wars, natural disasters and various high technologies force people for significant changes in business and social life. The adoption of digital technologies to transform services or businesses, through replacing non-digital or manual processes with digital processes or replacing older digital technology with newer digital technologies through intelligent systems is the main scope of this book. It focuses on revealing the reflection of digital transformation in our business and social life under emerging conditions through intelligent and fuzzy systems. The latest intelligent and fuzzy methods and techniques on digital transformation are introduced by theory and applications. The intended readers are intelligent and fuzzy systems researchers, lecturers, M.Sc. and Ph.D. students studying digital transformation. Usage of ordinary fuzzy sets and their extensions, heuristics and metaheuristics from optimization to machine learning, from quality management to risk management makes the book an excellent source for researchers.

Intelligent and Fuzzy Techniques in Big Data Analytics and Decision Making: Proceedings of the INFUS 2019 Conference, Istanbul, Turkey, July 23-25, 2019 (Advances in Intelligent Systems and Computing #1029)

by Cengiz Kahraman Selcuk Cebi Sezi Cevik Onar Basar Oztaysi A. Cagri Tolga Irem Ucal Sari

This book includes the proceedings of the Intelligent and Fuzzy Techniques INFUS 2019 Conference, held in Istanbul, Turkey, on July 23–25, 2019. Big data analytics refers to the strategy of analyzing large volumes of data, or big data, gathered from a wide variety of sources, including social networks, videos, digital images, sensors, and sales transaction records. Big data analytics allows data scientists and various other users to evaluate large volumes of transaction data and other data sources that traditional business systems would be unable to tackle. Data-driven and knowledge-driven approaches and techniques have been widely used in intelligent decision-making, and they are increasingly attracting attention due to their importance and effectiveness in addressing uncertainty and incompleteness. INFUS 2019 focused on intelligent and fuzzy systems with applications in big data analytics and decision-making, providing an international forum that brought together those actively involved in areas of interest to data science and knowledge engineering. These proceeding feature about 150 peer-reviewed papers from countries such as China, Iran, Turkey, Malaysia, India, USA, Spain, France, Poland, Mexico, Bulgaria, Algeria, Pakistan, Australia, Lebanon, and Czech Republic.

Intelligent and Fuzzy Techniques: Proceedings of the INFUS 2020 Conference, Istanbul, Turkey, July 21-23, 2020 (Advances in Intelligent Systems and Computing #1197)

by Cengiz Kahraman Selcuk Cebi Sezi Cevik Onar Basar Oztaysi A. Cagri Tolga Irem Ucal Sari

This book gathers the most recent developments in fuzzy & intelligence systems and real complex systems presented at INFUS 2020, held in Istanbul on July 21–23, 2020. The INFUS conferences are a well-established international research forum to advance the foundations and applications of intelligent and fuzzy systems, computational intelligence, and soft computing, highlighting studies on fuzzy & intelligence systems and real complex systems at universities and international research institutions. Covering a range of topics, including the theory and applications of fuzzy set extensions such as intuitionistic fuzzy sets, hesitant fuzzy sets, spherical fuzzy sets, and fuzzy decision-making; machine learning; risk assessment; heuristics; and clustering, the book is a valuable resource for academics, M.Sc. and Ph.D. students, as well as managers and engineers in industry and the service sectors.

Intelligent and Interactive Computing: Proceedings of IIC 2018 (Lecture Notes in Networks and Systems #67)

by Vincenzo Piuri Valentina Emilia Balas Samarjeet Borah Sharifah Sakinah Syed Ahmad

This book presents the latest research on computational approaches to learning. It includes high-quality peer-reviewed papers from the “Intelligent and Interactive Computing Conference (IIC 2018)” organized by the Universiti Teknikal Malaysia, Melaka. It uses empirical studies, theoretical analysis, and comparisons with psychological phenomena to show how learning methods can be employed to solve important application problems. The book also describes ongoing research in various research labs, universities and institutions, which may lead to the development of marketable products.

Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments: Second International Conference, ISDDC 2018, Vancouver, BC, Canada, November 28–30, 2018, Proceedings (Lecture Notes in Computer Science #11317)

by Isaac Woungang Issa Traore Sherif Saad Ahmed Yasir Malik

This book constitutes the refereed proceedings of the Second International Conference on Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments, ISDDC 2018, held in Vancouver, BC, Canada, in November 2018. The 10 full papers were carefully reviewed and selected from 28 submissions. This book also contains the abstracts of two keynote talks and one tutorial. The contributions included in this proceedings cover many aspects of theory and application of effective and efficient paradigms, approaches, and tools for building, maintaining, and managing secure and dependable systems and infrastructures, such as botnet detection, secure cloud computing and cryptosystems, IoT security, sensor and social network security, behavioral systems and data science, and mobile computing.

Intelligente Produktions- und Fertigungsoptimierung - Der Bienenalgorithmus-Ansatz

by Duc Truong Pham Natalia Hartono

Dieses Buch ist das erste Werk, das sich mit dem Bienenalgorithmus beschäftigt. Nach einer sanften Einführung in die wichtigsten Ideen, die dem Algorithmus zugrunde liegen, stellt das Buch aktuelle Ergebnisse und Entwicklungen im Zusammenhang mit dem Algorithmus und seiner Anwendung auf Optimierungsprobleme in Produktion und Fertigung vor.Mit dem Beginn der vierten industriellen Revolution sind Produktions- und Fertigungsprozesse und -systeme immer komplexer geworden. Um die beste Leistung aus ihnen herauszuholen, sind effiziente und effektive Optimierungstechniken erforderlich, die nicht von der Verfügbarkeit von Prozess- oder Systemmodellen abhängen. Solche Modelle sind in der Regel entweder nicht verfügbar oder aufgrund des hohen Grades an Nichtlinearität und Unsicherheiten in den darzustellenden Prozessen und Systemen mathematisch schwer zu lösen. Der Bienenalgorithmus ist eine leistungsstarke, schwarmbasierte, intelligente Optimierungs-Metaheuristik, die vom Suchverhalten der Honigbienen inspiriert ist. Der Algorithmus ist konzeptionell elegant und extrem einfach anzuwenden. Alles, was er zur Lösung eines Optimierungsproblems benötigt, ist ein Mittel zur Bewertung der Qualität potenzieller Lösungen. Dieses Buch zeigt die Einfachheit, Effektivität und Vielseitigkeit des Algorithmus und ermutigt Ingenieure und Forscher auf der ganzen Welt, ihn weiter einzusetzen, um eine intelligente und nachhaltige Fertigung und Produktion im Zeitalter von Industrie 4.0 und darüber hinaus zu realisieren.

Intelligente und nachhaltige Technologie für widerstandsfähige Städte und Gemeinden

by Lakhmi C. Jain Robert J. Howlett John R. Littlewood Marius M. Balas

Bei diesem Buch handelt es sich um eine Sammlung erweiterter Fassungen von Vorträgen, die auf dem internationalen KES-Gipfel Covid-19 Herausforderung gehalten wurden. Der Schwerpunkt des Buches liegt auf technologischen, wirtschaftlichen und sozialen Entwicklungen zur Bekämpfung der Auswirkungen globaler und lokaler Katastrophen sowie auf der Frage, wie die Erholung von Covid genutzt werden kann, um widerstandsfähigere und nachhaltigere Gemeinschaften und Industrien aufzubauen und die Umwelt zu verbessern. Auch die globalen Herausforderungen des vom Menschen beeinflussten Klimawandels werden erörtert. Die Kapitel befassen sich mit der Stärkung der Widerstandsfähigkeit von Städten und Gemeinden durch Energieautarkie, Lebensmittelproduktion, widerstandsfähige Wohnungen und Gebäude, menschliche Gesundheit und intelligente Systeme, z. B. für Vorhersagen und Prognosen.

Intelligenter Separator: Optimale Veredelung von Lebensmitteln (Intelligente Technische Systeme – Lösungen aus dem Spitzencluster it’s OWL)

by Roman Dumitrescu Markus Fleuter

Das Buch beinhaltet die Ergebnisse des dreijährigen Verbundprojekts "Separator i4.0" des BMBF-Spitzenclusters it's OWL. Gegenstand des Projekts war die nachhaltige Einbindung von Expertenwissen in die zukunftsweisende Weiterentwicklung und Optimierung von Separationsprozessen. Durch die Entwicklung neuartiger intelligenter Komponenten aus dem Bereich der Sensorik wird es zukünftig möglich sein, Separatoren und die zugehörigen Prozesszusammenhänge zu verstehen und diese ökologisch/ökonomisch optimal auszulegen und zu betreiben. Hierzu wurde ein Instrumentarium bestehend aus Methoden und Lösungen erarbeitet, das darüber hinaus auf analoge Problemstellungen komplexer maschinenbaulicher Anlagen anwendbar sein wird.

Intel® Galileo and Intel® Galileo Gen 2: API Features and Arduino Projects for Linux Programmers

by Manoel Carlos Ramon

Intel® Galileo and Intel® Galileo Gen 2: API Features and Arduino Projects for Linux Programmers provides detailed information about Intel® Galileo and Intel® Galileo Gen 2 boards for all software developers interested in Arduino and the Linux platform. The book covers the new Arduino APIs and is an introduction for developers on natively using Linux. Author Manoel Carlos Ramon is a member of the Intel Galileo development team; in this book he draws on his practical experience in working on the Galileo project as he shares the team's findings, problems, fixes, workarounds, and techniques with the open source community. His areas of expertise are wide-ranging, including Linux-embedded kernel and device drivers, C/C++, Java, OpenGL, Assembler, Android NDK/SDK/ADK, and 2G/3G/4G modem integration. He has more than 17 years of experience in research and development of mobile devices and embedded circuits. His personal blog about programming is BytesThink (www. bytesthink. com). What you'll learn * How Linux libraries and applications are used and interact with sketches * How to configure WiFi mPCIe * How to develop and debug Intel's Galileo and Intel Galileo Gen 2 sketches using the Arduino IDE, native Linux applications, and hacking * Integration of OpenCV and V4L2 in C/C++/Python to capture picture and videos, and to detect faces, eyes, and your emotional state with a Fisherfaces model * How to exchange data using the 7160 LTE modem * How to tweet with REST API 1. 1 and OAuth authentication * How to control a 6 DOF robot arm using a gripper based in coffee grains, as well as how to create a special API and hardware for six analogic controls * Home Automation with node. js * How to manage temperature sensors, barometric sensors, and PIR motion sensors, as well as how to create your own soil moisture sensors and keypad * How to use a Power of Ethernet (PoE) module on Intel Galileo Gen 2 Who this book is for Software and hardware developers interested in embedded Linux and Arduino. Table of Contents Chapter 1: Intel Galileo Intel Galileo Gen 2 Chapter 2: Native Development Chapter 3: Arduino IDE and the Wiring Language Chapter 4: New APIs and Hacks Chapter 5: Networking and Hacks Chapter 6: Tweeting With REST API 1. 1 Chapter 7: Using OpenCV Chapter 8: Creating a Soil Moisture Sensor Chapter 9: Home Automation and Dynamic Web Chapter 10: Power Over Ethernet (PoE) Chapter 11: Assembling and Controlling a Robotic Arm Chapter 12: Using an LTE Modem Appendix A: Intel Galileo I/O and Muxing Appendix B: Intel Galileo Gen 2 I/O and Muxing Appendix C: Video Capturing Appendix D: Picture Grabber

Intel® Trusted Execution Technology for Server Platforms: A Guide to More Secure Datacenters

by William Futral James Greene

"This book is a must have resource guide for anyone who wants to . . . implement TXT within their environments. I wish we had this guide when our engineering teams were implementing TXT on our solution platforms!" John McAuley,EMC Corporation "This book details innovative technology that provides significant benefit to both the cloud consumer and the cloud provider when working to meet the ever increasing requirements of trust and control in the cloud. " Alex Rodriguez, Expedient Data Centers "This book is an invaluable reference for understanding enhanced server security, and how to deploy and leverage computing environment trust to reduce supply chain risk. " Pete Nicoletti. Virtustream Inc. Intel® Trusted Execution Technology (Intel TXT) is a new security technology that started appearing on Intel server platforms in 2010. This book explains Intel Trusted Execution Technology for Servers, its purpose, application, advantages, and limitations. This book guides the server administrator / datacenter manager in enabling the technology as well as establishing a launch control policy that he can use to customize the server's boot process to fit the datacenter's requirements. This book explains how the OS (typically a Virtual Machine Monitor or Hypervisor) and supporting software can build on the secure facilities afforded by Intel TXT to provide additional security features and functions. It provides examples how the datacenter can create and use trusted pools. With a foreword from Albert Caballero, the CTO at Trapezoid. What you'll learn It explains why TXT is important and the underlying principles (why it is effective). How to enable and provision TXT How to create a Launch Control Policy. It discusses trade-offs in determining the right policy for the datacenter, and walks the reader through the process for establishing the policy. Demonstrates how to set up and use trusted pools and other advanced concepts such as geo-tagging. It walks the reader through the process of making Intel TXT work for them and understand that TXT is a building block for current and future enhanced security concepts. Who this book is for The primary audience is the Datacenter Manager and members of an IT organization. It will be valuable to executives that need to understand enhanced server security and will provide a guide to OSVs and ISVs not only to understand the application of TXT but also the new opportunities that TXT enables and ways that the OS and applications can take advantage of those new capabilities. This book applies to cloud computing since TXT can be used to provide additional security for both public and private clouds. Table of Contents Introduction Principals of TXT TXT Provisioning Launch Control Policy Opportunities for the OSV and ISVs Creating a More Secure Data Center Trusted Pools and Cloud Compliance Support Appendix

Intel® Xeon PhiTM Coprocessor Architecture and Tools: The Guide for Application Developers

by Rezaur Rahman

Intel#65533; Xeon Phi(tm) Coprocessor Architecture and Tools: The Guide for Application Developers provides developers a comprehensive introduction and in-depth look at the Intel Xeon Phi coprocessor architecture and the corresponding parallel data structure tools and algorithms used in the various technical computing applications for which it is suitable. It also examines the source code-level optimizations that can be performed to exploit the powerful features of the processor. Xeon Phi is at the heart of world's fastest commercial supercomputer, which thanks to the massively parallel computing capabilities of Intel Xeon Phi processors coupled with Xeon Phi coprocessors attained 33. 86 teraflops of benchmark performance in 2013. Extracting such stellar performance in real-world applications requires a sophisticated understanding of the complex interaction among hardware components, Xeon Phi cores, and the applications running on them. In this book, Rezaur Rahman, an Intel leader in the development of the Xeon Phi coprocessor and the optimization of its applications, presents and details all the features of Xeon Phi core design that are relevant to the practice of application developers, such as its vector units, hardware multithreading, cache hierarchy, and host-to-coprocessor communication channels. Building on this foundation, he shows developers how to solve real-world technical computing problems by selecting, deploying, and optimizing the available algorithms and data structure alternatives matching Xeon Phi's hardware characteristics. From Rahman's practical descriptions and extensive code examples, the reader will gain a working knowledge of the Xeon Phi vector instruction set and the Xeon Phi microarchitecture whereby cores execute 512-bit instruction streams in parallel.

Intent Recognition for Human-Machine Interactions (SpringerBriefs in Computer Science)

by Hua Xu Hanlei Zhang Ting-En Lin

Natural interaction is one of the hottest research issues in human-computer interaction. At present, there is an urgent need for intelligent devices (service robots, virtual humans, etc.) to be able to understand intentions in an interactive dialogue. Focusing on human-computer understanding based on deep learning methods, the book systematically introduces readers to intention recognition, unknown intention detection, and new intention discovery in human-computer dialogue. This book is the first to present interactive dialogue intention analysis in the context of natural interaction. In addition to helping readers master the key technologies and concepts of human-machine dialogue intention analysis and catch up on the latest advances, it includes valuable references for further research.

Intentional Perspectives on Information Systems Engineering

by Selmin Nurcan Jolita Ralyté Carine Souveyet Camille Salinesi

Requirements engineering has since long acknowledged the importance of the notion that system requirements are stakeholder goals--rather than system functions--and ought to be elicited, modeled and analyzed accordingly. In this book, Nurcan and her co-editors collected twenty contributions from leading researchers in requirements engineering with the intention to comprehensively present an overview of the different perspectives that exist today, in 2010, on the concept of intention in the information systems community. These original papers honor Colette Rolland for her contributions to this field, as she was probably the first to emphasize that 'intention' has to be considered as a first-class concept in information systems engineering. Written by long-term collaborators (and most often friends) of Colette Rolland, this volume covers topics like goal-oriented requirements engineering, model-driven development, method engineering, and enterprise modeling. As such, it is a tour d'horizon of Colette Rolland's lifework, and is presented to her on the occasion of her retirement at CaISE 2010 in Hammamet, the conference she once cofounded and which she helped to grow and prosper for more than 20 years.

Intentional Risk Management through Complex Networks Analysis

by Victor Chapela Regino Criado Santiago Moral Miguel Romance

This book combines game theory and complex networks to examine intentional technological risk through modeling. As information security risks are in constant evolution, the methodologies and tools to manage them must evolve to an ever-changing environment. A formal global methodology is explained in this book, which is able to analyze risks in cyber security based on complex network models and ideas extracted from the Nash equilibrium. A risk management methodology for IT critical infrastructures is introduced which provides guidance and analysis on decision making models and real situations. This model manages the risk of succumbing to a digital attack and assesses an attack from the following three variables: income obtained, expense needed to carry out an attack, and the potential consequences for an attack. Graduate students and researchers interested in cyber security, complex network applications and intentional risk will find this book useful as it is filled with a number of models, methodologies and innovative examples.

Intentional Stance Towards Humanoid Robots: Lessons Learned from Studies in Human-Robot Interaction

by Agnieszka Wykowska

With the reinassance of Artificial Intelligence (AI) and AI-empowered technologies, such as robots, we are all asking ourselves the question: What role will these new technologies play in our lives and in our society? On the one hand, we are excited about the new opportunities that AI and robots bring. On the other hand, there are understandable fears: What if the AI becomes too powerful? What if the robots become too human-like? This book is centered around a theoretical framework of the Intentional Stance, initially proposed by Daniel Dennett, and addresses the timely question: How do we, humans, approach robots? Do we see them as intentional agents that can potentially become our social companions? Or do we rather approach them as tools, man-made artifacts? What does it take for a robot to make an impression that it is an intentional/social agent? Is it its appearance? Its behaviour? Or, perhaps (and quite likely), the way it interacts with the human? These questions are addressed across various chapters of book, each of which is then complemented by an inspiring conversation with one of the prominent academics and scholars: Daniel Dennett (Philosophy) – the originator of the concept of the Intentional Stance; Hiroshi Ishiguro (Robotics) – the creator of androids, David Gunkel (Robot-Ethics), Bertram Malle (Cognitive Science), Antonio Sgorbissa (Culturally-competent Social Robotics), Bill Vorn (Robotic Art). The book discusses also some important ethical considerations to be made, and risks to be aware of. Do we actually want to create robots that are treated as intentional agents? What if the line between the human/robot categories becomes blurred? As intentional agents, should robots become also moral agents and legal persons in our societal and legal systems?

Inter- and Intra-Vehicle Communications

by Gilbert Held

The PC revolution, the advent of PDAs, and growth in the use of wireless LANs have changed the way we live our lives. Next on the horizon is the application of new technologies that will change the way we drive our cars. De rigeur for many drivers, electronic passes and GPS systems represent the tip of the iceberg in terms of emerging applications

Inter-cooperative Collective Intelligence: Techniques and Applications

by Fatos Xhafa Nik Bessis

This book covers the latest advances in the rapid growing field of inter-cooperative collective intelligence aiming the integration and cooperation of various computational resources, networks and intelligent processing paradigms to collectively build intelligence and advanced decision support and interfaces for end-users. The book brings a comprehensive view of the state-of-the-art in the field of integration of sensor networks, IoT and Cloud computing, massive and intelligent querying and processing of data. As a result, the book presents lessons learned so far and identifies new research issues, challenges and opportunities for further research and development agendas. Emerging areas of applications are also identified and usefulness of inter-cooperative collective intelligence is envisaged. Researchers, software developers, practitioners and students interested in the field of inter-cooperative collective intelligence will find the comprehensive coverage of this book useful for their research, academic, development and practice activity.

Inter/vention

by Jan Rune Jan Rune Holmevik

In today's complex digital world, we must understand new media expressions and digital experiences not simply as more technologically advanced forms of "writing" that can be understood and analyzed as "texts" but as artifacts in their own right that require a unique skill set. Just as agents seeking to express themselves in alphabetic writing need to be literate, "egents" who seek to express themselves in digital media need to be--to use a term coined by cybertheorist Gregory Ulmer-- electrate. In Inter/vention, Jan Holmevik helps to invent electracy. He does so by tracing its path across the digital and rhetorical landscape--informatics, hacker heuretics, ethics, pedagogy, virtual space, and monumentality--and by introducing play as a new genre of electracy. Play, he argues, is the electrate ludic transversal. Holmevik contributes to the repertoire of electrate practices in order to understand and demonstrate how play invents electracy. Holmevik's argument straddles two divergences: in rhetoric, between how we study rhetoric as play and how we play rhetorically; and in game studies, between ludology and narratology. Games studies has forged ludology practice by distinguishing it from literate practice (and often allying itself with the scientific tradition). Holmevik is able to link ludology and rhetoric through electracy. Play can and does facilitate invention: play invented the field of ludology. Holmevik proposes a new heuretic in which play acts as a conductor for the invention of electracy. Play is a meta behavior that touches on every aspect of Ulmer's concept of electracy.

Inter/vention: Free Play in the Age of Electracy

by Jan Rune Holmevik

A proposal that electracy—the special skills needed to navigate and understand our digital world—can be developed through play. In today's complex digital world, we must understand new media expressions and digital experiences not simply as more technologically advanced forms of “writing” that can be understood and analyzed as “texts” but as artifacts in their own right that require a unique skill set. Just as agents seeking to express themselves in alphabetic writing need to be literate, “egents” who seek to express themselves in digital media need to be—to use a term coined by cybertheorist Gregory Ulmer—electrate. In Inter/vention, Jan Holmevik helps to invent electracy. He does so by tracing its path across the digital and rhetorical landscape—informatics, hacker heuretics, ethics, pedagogy, virtual space, and monumentality—and by introducing play as a new genre of electracy. Play, he argues, is the electrate ludic transversal. Holmevik contributes to the repertoire of electrate practices in order to understand and demonstrate how play invents electracy.Holmevik's argument straddles two divergences: in rhetoric, between how we study rhetoric as play and how we play rhetorically; and in game studies, between ludology and narratology. Games studies has forged ludology practice by distinguishing it from literate practice (and often allying itself with the scientific tradition). Holmevik is able to link ludology and rhetoric through electracy.Play can and does facilitate invention: play invented the field of ludology. Holmevik proposes a new heuretic in which play acts as a conductor for the invention of electracy. Play is a meta behavior that touches on every aspect of Ulmer's concept of electracy.

Interact with Information Technology 1 new edition

by Michele Taylor Roland Birbal

Provide an accessible approach to theory and practice with this new edition updated to comprehensively cover recent IT developments and the latest Caribbean curricula for Forms 1 to 3 (Grades 7 to 9).- Consolidate learning through a range of question types such as Multiple Choice, True or False, Short Answer and a fun Crossword puzzle.- Build critical thinking and project work skills with research and STEM projects using real life situations.- Develop understanding with new topics covered such as computer ethics, algorithm development, emerging careers.The answers can be found here: www.hoddereducation.co.uk/interactanswers

Interact with Information Technology 2 new edition

by Michele Taylor Roland Birbal

Provide an accessible approach to theory and practice with this new edition updated to comprehensively cover recent IT developments and the latest Caribbean curricula for Forms 1 to 3 (Grades 7 to 9).- Consolidate learning through a range of question types such as Multiple Choice, True or False, Short Answer and a fun Crossword puzzle.- Build critical thinking and project work skills with research and STEM projects using real life situations.- Develop understanding with new topics covered such as computer ethics, algorithm development, emerging careers.The answers can be found here: www.hoddereducation.co.uk/interactanswers

Refine Search

Showing 30,151 through 30,175 of 61,748 results