- Table View
- List View
Support Vector Machines and Perceptrons
by M. N. Murty Rashmi RaghavaThis work reviews the state of the art in SVM and perceptron classifiers. A Support Vector Machine (SVM) is easily the most popular tool for dealing with a variety of machine-learning tasks, including classification. SVMs are associated with maximizing the margin between two classes. The concerned optimization problem is a convex optimization guaranteeing a globally optimal solution. The weight vector associated with SVM is obtained by a linear combination of some of the boundary and noisy vectors. Further, when the data are not linearly separable, tuning the coefficient of the regularization term becomes crucial. Even though SVMs have popularized the kernel trick, in most of the practical applications that are high-dimensional, linear SVMs are popularly used. The text examines applications to social and information networks. The work also discusses another popular linear classifier, the perceptron, and compares its performance with that of the SVM in different application areas. >
Support Vector Machines and Their Application in Chemistry and Biotechnology
by Yizeng Liang Qing-Song Xu Hong-Dong Li Dong-Sheng CaoSupport vector machines (SVMs) are used in a range of applications, including drug design, food quality control, metabolic fingerprint analysis, and microarray data-based cancer classification. While most mathematicians are well-versed in the distinctive features and empirical performance of SVMs, many chemists and biologists are not as familiar wi
Support Vector Machines for Pattern Classification
by Shigeo AbeA guide on the use of SVMs in pattern classification, including a rigorous performance comparison of classifiers and regressors. The book presents architectures for multiclass classification and function approximation problems, as well as evaluation criteria for classifiers and regressors. Features: Clarifies the characteristics of two-class SVMs; Discusses kernel methods for improving the generalization ability of neural networks and fuzzy systems; Contains ample illustrations and examples; Includes performance evaluation using publicly available data sets; Examines Mahalanobis kernels, empirical feature space, and the effect of model selection by cross-validation; Covers sparse SVMs, learning using privileged information, semi-supervised learning, multiple classifier systems, and multiple kernel learning; Explores incremental training based batch training and active-set training methods, and decomposition techniques for linear programming SVMs; Discusses variable selection for support vector regressors.
Supporting Higher Education 4.0 with Blockchain: Critical Analyses of Automation, Data, Digital Currency, and Other Disruptive Applications
by Grażyna Paliwoda-Pękosz Piotr SojaThis book explores the current and future impacts of blockchain technologies, such as cryptocurrency, on the education system. Blockchain is a disruptive technology based on a shared, distributed ledger, where transactions are registered by consensus in a network of peers, using cryptographic mechanisms that render the records virtually immutable and, ideally, enable transparency, auditability, and resilience. What role, then, could it play in fostering transformative approaches such as student-centred teaching and learning, distributed learning environments, and lifelong learning? This book provides essential perspectives into blockchain applications and challenges within education and offers a broader view of blockchain technology against existing information and communication technologies used in education. Spanning the effects on institutions, students, and the labor market, these chapters offer critical reviews and analyses of current research, practical first-hand applications of blockchain in education, and original conceptual models.
Supporting Online Students
by Anita CrawleySupporting Online Students shows how effective and efficiently delivered support services improve academic success and course retention for online learners. Drawing on a decade's worth of research, Crawley describes the scope of services that should be made available to online students, from admissions and registration to advising and student engagement. The book includes guidelines and standards for these services as outlined by half a dozen national professional organizations, as well as planning and implementation, innovative practices, and specialized services needed by particular online student groups.
Supporting People with Dementia Using Pervasive Health Technologies
by Chris D. Nugent Maurice D MulvennaInformation and communication technologies can provide new paradigms in healthcare provision. In particular, new Pervasive Healthcare technologies can revolutionise the dynamics of healthcare, enabling people to remain at home for longer, at lower costs to health and welfare organisations. This book reveals how pervasive healthcare technologies can be designed in conjunction with users and carers, as well as exploring the application of novel methods and technologies.
Supporting Real Time Decision-Making
by Arkady Zaslavsky Frada Burstein Patrick BrézillonThis volume of Annals of Information Systems will acknowledge the twentieth anniversary of the founding of the International Society for Decision Support Systems (ISDSS) by documenting some of the current best practices in teaching and research and envisioning the next twenty years in the decision support systems field. The volume is intended to complement existing DSS literature by offering an outlet for thoughts and research particularly suited to the theme of describing the next twenty years in the area of decision support. Several subthemes are planned for the volume. One subtheme draws on the assessments of internationally known DSS researchers to evaluate where the field has been and what has been accomplished. A second subtheme of the volume will be describing the current best practices of DSS research and teaching efforts. A third subtheme will be an assessment by top DSS scholars on where the DSS discipline needs to focus in the future. The tone of this volume is one of enthusiasm for the potential contributions to come in the area of DSS; contributions that must incorporate an understanding of what has been accomplished in the past, build on the best practices of today, and be integrated into future decision making practices.
Supporting Web Search and Navigation by an Overlay Linking Structure (Studies in Big Data #142)
by Georg Philipp RoßruckerSearch and navigation in hyperlinked networks have been subjects of research since the Internet emerged. Due to its incompleteness in terms of linking related content, the existing linking structure of the Web and similar networks cannot be utilized as a searchable index without prior application of suitable crawling strategies and content categorization. Following the example of sitemaps, a map-like extension to the existing link structure of the network is proposed that creates additional contextual links. For this, a concept and algorithms are devised that allow the creation of contextual cluster files, to which documents are assigned and between which semantically relevant links are established. The resulting WebMap covers all searchable resources on the original network in a contextual overlay network and enables new search and navigation approaches.
Supremacy: AI, ChatGPT, and the Race that Will Change the World
by Parmy OlsonWINNER OF THE THE FINANCIAL TIMES AND SCHRODERS 2024 BUSINESS BOOK OF THE YEAR AWARDIn November of 2022, a webpage was posted online with a simple text box. It was an AI chatbot called ChatGPT, and was unlike any app people had used before. It was more human than a customer service agent, more convenient than a Google search. Behind the scenes, battles for control and prestige between the world’s two leading AI firms, OpenAI and DeepMind, who now steers Google's AI efforts, has remained elusive - until now.In Supremacy, Olson, tech writer at Bloomberg, tells the astonishing story of the battle between these two AI firms, their struggles to use their tech for good, and the hazardous direction they could go as they serve two tech Goliaths whose power is unprecedented in history. The story focuses on the continuing rivalry of two key CEOs at the center of it all, who cultivated a religion around their mission to build god-like super intelligent machines: Sam Altman, CEO of OpenAI, and Demis Hassabis, the CEO of DeepMind. Supremacy sharply alerts readers to the real threat of artificial intelligence that its top creators are ignoring: the profit-driven spread of flawed and biased technology into industries, education, media and more. With exclusive access to a network of high-ranking sources, Parmy Olson uses her 13 years of experience covering technology to bring to light the exploitation of the greatest invention in human history, and how it will impact us all.
The Sure Thing: The Greatest Coup in Horse Racing History
by Nick Townsend__________________The bookies always win. But one man has been proving them wrong for four decades. In the summer of 1975 Barney Curley, a fearless and renowned gambler, masterminded one of the most spectacular gambles of all time with a racehorse called Yellow Sam. With a meticulous, entirely legal plan involving dozens of people, perfectly timed phone calls, sealed orders and months of preparation, Curley and Yellow Sam beat the bookmakers and cost them millions. They said that it could never happen again. But in May 2010, thirty-five years after his first coup, Curley staged the ultimate multi-million-pound-winning sequel.The Sure Thing tells the complete story of how he managed to organise the biggest gamble in racing history - and how he then followed up with yet another audacious scheme in January 2014.
Surface- and Groundwater Quality Changes in Periods of Water Scarcity
by Miloš GregorThis thesis deals with the evaluation of surface and groundwater quality changes in the periods of water scarcity in river catchment areas. The work can be divided into six parts. Existing methods of drought assessment are discussed in the first part, followed by the brief description of the software package HydroOffice, designed by the author. The software is dedicated to analysis of hydrological data (separation of baseflow, parameters of hydrological drought estimation, recession curves analysis, time series analysis). The capabilities of the software are currently used by scientist from more than 30 countries around the world. The third section is devoted to a comprehensive regional assessment of hydrological drought on Slovak rivers, followed by evaluation of the occurrence, course and character of drought in precipitation, discharges, base flow, groundwater head and spring yields in the pilot area of the Nitra River basin. The fifth part is focused on the assessment of changes in surface and groundwater quality during the drought periods within the pilot area. Finally, the results are summarized and interpreted, and rounded off with an outlook to future research.
Surface For Dummies
by Andy RathboneMake Microsoft's Surface work--and play--just the way you want it toMicrosoft's Surface tablet has the features and personality you're looking for, with a robust environment for business computing that doesn't skimp on fun. Surface for Dummies, 2nd Edition explains how Windows 8.1 Pro and Windows RT differ, and helps you decide which Surface model is best for you. Step by step, this book walks you through both the hardware and software features of the Surface, including the touch cover and type cover, Windows RT and Windows 8.1 Pro operating systems, and the coveted Office Home & Student 2013 software suite that's bundled with the Surface. Written by bestselling author Andy Rathbone, this easy-to-access book is filled with information on how to use the tablet, figure out the operating system, navigate the app environment, and take advantage of your exciting new Surface.The book is your personal guide to one the fastest, sleekest, and most powerful tablets on the market. Surface is designed to be thin, light, and with hours of battery life so you can power through your day with ease. With this handy reference, you'll be able to make quick work of your to-do list and have fun all at the same time!Create: release your inner artist with Fresh Paint, a touch-based art appShare: Multiple accounts offer privacy and security so you can share your Surface, but not your stuffEnjoy: Snap apps side by side to multi-task on the vivid HD screenDiscover: New apps in the Windows Store so you can work efficiently and get more doneWith Surface For Dummies, 2nd Edition you can navigate and enhance your entire Surface experience!
Surreal Photography: Creating the Impossible
by Daniela BowkerEver since Man Ray imposed the sound holes of a violin onto his model's back, photographers have been enthusiastic practitioners of surreal art. Now with the advent of high-quality digital photo-manipulation the possibilities for creativity have become infinite. This book reveals the latest techniques in the field of surreal photography and features art from a host of the very best modern surreal photographers.- Breaks down the shooting and editing process so any photographer can make their own impossible images- With processing walkthroughs from contributing artists including Natalie Dybisz, Julie de Waroquier and Sarolta Bán- Step-by-step instructions for creating extraordinary scenes- Covers many different styles, from impossible landscapes to unsettling portraits
Surreal Photography: Creating The Impossible
by Daniela BowkerSurreal digital photography is not only an enjoyable extension of many enthusiast’s repertoire, but is has firmly established a foothold in the world of art. This book reveals the latest developments in the field and demystifies the techniques used by modern surreal photographers, whether they favor SOOC (straight out of the camera) or sophisticated digital manipulations. Breaking down the shooting and editing process for any reader to follow and emulate, this book provides step-by-step instructions for creating extraordinary scenes. With contributions from numerous artists—including Natalie Dybisz, Jon Jacobsen and Dariusz Klimczak— readers will be able to explore many different artistic styles from impossible landscapes to unsettling portraits.
Surveillance and Surveillance Detection: A CIA Insider's Guide
by John KiriakouHave you ever thought you were being followed or watched? Have you ever needed to follow or observe someone and not be seen?In the world of espionage, surveillance and surveillance detection are a way of life. It is the job of every CIA operations officer to make sure he or she is not under surveillance—that is, being followed to the commission of an &“operational act.&” It is also the job of every CIA operations officer to surveil his own targets, whether they are terrorists or terrorist suspects, foreign intelligence officers, hostile actors, or even sometimes his own agents for vetting purposes. In everyday life, many people from all walks of life need to know how to perform similar operations. Whether avoiding a stalker, checking up on an unfaithful partner, or just securing one&’s own privacy, a working knowledge of modern surveillance and surveillance detection techniques is a critical skill to possess. And there is nobody better to teach that skill than someone trained by the CIA.From former CIA counterterrorism officer John C. Kiriakou, Surveillance and Surveillance Detection: A CIA Insider's Guide takes you through the CIA's surveillance and surveillance detection program. It will teach you to apply CIA surveillance techniques to your own everyday life. You&’ll learn how to stay safe, to ensure your privacy, and to keep the honest people honest—the CIA way.
Surveillance Law, Data Retention and Human Rights: A Risk to Democracy (Routledge Research in Human Rights Law)
by Matthew WhiteThis book analyses the compatibility of data retention in the UK with the European Convention on Human Rights (ECHR). The increase in the use of modern technology has led to an explosion of generated data and, with that, a greater interest from law enforcement and intelligence agencies. In the early 2000s, data retention laws were introduced into the UK, and across the European Union (EU). This was met by domestic challenges before national courts, until a seminal ruling by the Court of Justice in the European Union (CJEU) ruled that indiscriminate data retention was incompatible with EU law. Since then, however, the CJEU has revised its position and made certain concessions, particularly under the guise of national security. This book focuses on data retention in the UK with the principal aim of examining compatibility with the ECHR. This is explored through a variety of ways including providing an account of democracy and why secret surveillance poses a threat to it, a history of data retention, assessing the seriousness that data retention poses to fundamental rights, the collection of rights that are affected by data retention which are crucial for a functioning democracy, the implications of who can be obligated to retain (and what to retain), the idea that data retention is a form of surveillance and ultimately, with all things considered, whether this is compatible with the ECHR. The work will be an invaluable resource for students, academics, researchers and policy-makers working in the areas of privacy, human rights law and surveillance.
Surveillance, Prevention, and Control of Infectious Diseases: An AI Perspective
by Serkan Kiranyaz Muhammad E. H. ChowdhuryThis is a pioneering book that delves into the intersection of artificial intelligence (AI) and healthcare, specifically focusing on the detection and prevention of infectious diseases. Authored by leading experts in the field, this book offers a comprehensive overview of the latest advancements, challenges, and applications of AI in combating infectious diseases. With a unique emphasis on big data, wearable data, and computer vision, the book presents original research works that showcase innovative approaches to leveraging AI for disease surveillance, screening, and severity stratification. Through a combination of review chapters summarizing the current state of the field and novel applications of AI technology, readers gain valuable insights into the potential of AI in addressing major life-threatening infectious diseases identified by the UN Sustainable Development Goal 3. The book's structure ensures a balanced blend of theoretical foundations and practical applications, making it accessible to both researchers and healthcare professionals. By exploring cutting-edge methodologies and case studies, the book equips readers with the knowledge and tools needed to harness the power of AI in the fight against infectious diseases, ultimately contributing to global efforts to improve public health outcomes. With its interdisciplinary approach and focus on AI-driven solutions, " Surveillance, prevention, and control of infectious diseases: An AI perspective" serves as an invaluable resource for researchers, practitioners, and policymakers seeking to stay abreast of the latest developments in this rapidly evolving field. Whether exploring the role of wearable devices in disease monitoring or examining the potential of computer vision for early detection, this book offers a comprehensive overview of AI applications that have the potential to revolutionize infectious disease management and prevention strategies.
Surveillance Valley: The Secret Military History of the Internet
by Yasha LevineThe internet is the most effective weapon the government has ever built.In this fascinating book, investigative reporter Yasha Levine uncovers the secret origins of the internet, tracing it back to a Pentagon counterinsurgency surveillance project.A visionary intelligence officer, William Godel, realized that the key to winning the war in Vietnam was not outgunning the enemy, but using new information technology to understand their motives and anticipate their movements. This idea--using computers to spy on people and groups perceived as a threat, both at home and abroad--drove ARPA to develop the internet in the 1960s, and continues to be at the heart of the modern internet we all know and use today. As Levine shows, surveillance wasn't something that suddenly appeared on the internet; it was woven into the fabric of the technology.But this isn't just a story about the NSA or other domestic programs run by the government. As the book spins forward in time, Levine examines the private surveillance business that powers tech-industry giants like Google, Facebook, and Amazon, revealing how these companies spy on their users for profit, all while doing double duty as military and intelligence contractors. Levine shows that the military and Silicon Valley are effectively inseparable: a military-digital complex that permeates everything connected to the internet, even coopting and weaponizing the antigovernment privacy movement that sprang up in the wake of Edward Snowden.With deep research, skilled storytelling, and provocative arguments, Surveillance Valley will change the way you think about the news--and the device on which you read it.
A Survey of Characteristic Engine Features for Technology-Sustained Pervasive Games (SpringerBriefs in Computer Science)
by Kim J.L. NevelsteenThis book scrutinizes pervasive games from a technological perspective, focusing on the sub-domain of games that satisfy the criteria that they make use of virtual game elements. In the computer game industry, the use of a game engine to build games is common, but current game engines do not support pervasive games. Since the computer game industry is already rich with game engines, this book investigates: (i) if a game engine can be repurposed to stage pervasive games; (ii) if features describing a would-be pervasive game engine can be identified; (iii) using those features, if an architecture be found in the same 'product line' as an existing engine and that can be extended to stage pervasive games (iv) and, finally, if there any challenges and open issues that remain. The approach to answering these questions is twofold. First, a survey of pervasive games is conducted, gathering technical details and distilling a component feature set that enables pervasive games. Second, a type of game engine is chosen as candidate in the same product line as a would-be pervasive game engine, supporting as much of the feature set as possible. The architecture is extended to support the entire feature set and used to stage a pervasive game called Codename: Heroes, validating the architecture, highlighting features of particular importance and identifying any open issues. The conclusion of this book is also twofold: the resulting feature set is verified to coincide with the definition of pervasive games and related work. And secondly, a virtual world engine is selected as candidate in the same product line as a would-be pervasive game engine. Codename: Heroes was successfully implemented, reaping the benefits of using the selected engine; development time was low, spanning just a few months. Codename: Heroes was staged twice, with no stability issues or down time.
A Survey of Computational Physics: Introductory Computational Science
by Rubin Landau José Páez Cristian C. BordeianuComputational physics is a rapidly growing subfield of computational science, in large part because computers can solve previously intractable problems or simulate natural processes that do not have analytic solutions. The next step beyond Landau's First Course in Scientific Computing and a follow-up to Landau and Páez's Computational Physics, this text presents a broad survey of key topics in computational physics for advanced undergraduates and beginning graduate students, including new discussions of visualization tools, wavelet analysis, molecular dynamics, and computational fluid dynamics. By treating science, applied mathematics, and computer science together, the book reveals how this knowledge base can be applied to a wider range of real-world problems than computational physics texts normally address. Designed for a one- or two-semester course, A Survey of Computational Physics will also interest anyone who wants a reference on or practical experience in the basics of computational physics. Accessible to advanced undergraduates Real-world problem-solving approach Java codes and applets integrated with text Companion Web site includes videos of lectures
A Survey of Core Research in Information Systems (SpringerBriefs in Computer Science)
by Anna Sidorova Nicholas Evangelopoulos Russell Torres Vess JohnsonThe Information Systems (IS) discipline was founded on the intersection of computer science and organizational sciences, and produced a rich body of research on topics ranging from database design and the strategic role of IT to website design and online consumer behavior. In this book, the authors provide an introduction to the discipline, its development, and the structure of IS research, at a level that is appropriate for emerging and current IS scholars. Guided by a bibliometric study of all research articles published in eight premier IS research journals over a 20-year period, the authors identify and present the top 51 IS research topics. For each topic, they provide a brief overview, time trends, and references to related influential research works. The topics are organized into an IS research framework that includes research on the IT artifact and IS development, IT and organizations, IT and individuals, IT and markets, and IT for teamwork and collaboration.
A Survey of Data Leakage Detection and Prevention Solutions (SpringerBriefs in Computer Science)
by Yuval Elovici Asaf Shabtai Lior RokachSpringerBriefs present concise summaries of cutting-edge research and practical applications across a wide spectrum of fields. Featuring compact volumes of 50 to 100 pages (approximately 20,000- 40,000 words), the series covers a range of content from professional to academic. Briefs allow authors to present their ideas and readers to absorb them with minimal time investment. As part of Springer's eBook collection, SpringBriefs are published to millions of users worldwide. Information/Data Leakage poses a serious threat to companies and organizations, as the number of leakage incidents and the cost they inflict continues to increase. Whether caused by malicious intent, or an inadvertent mistake, data loss can diminish a company's brand, reduce shareholder value, and damage the company's goodwill and reputation. This book aims to provide a structural and comprehensive overview of the practical solutions and current research in the DLP domain. This is the first comprehensive book that is dedicated entirely to the field of data leakage and covers all important challenges and techniques to mitigate them. Its informative, factual pages will provide researchers, students and practitioners in the industry with a comprehensive, yet concise and convenient reference source to this fascinating field. We have grouped existing solutions into different categories based on a described taxonomy. The presented taxonomy characterizes DLP solutions according to various aspects such as: leakage source, data state, leakage channel, deployment scheme, preventive/detective approaches, and the action upon leakage. In the commercial part we review solutions of the leading DLP market players based on professional research reports and material obtained from the websites of the vendors. In the academic part we cluster the academic work according to the nature of the leakage and protection into various categories. Finally, we describe main data leakage scenarios and present for each scenario the most relevant and applicable solution or approach that will mitigate and reduce the likelihood and/or impact of the leakage scenario.
A Survey of Fractal Dimensions of Networks (SpringerBriefs in Computer Science)
by Eric RosenbergMany different fractal dimensions have been proposed for networks. In A Survey of Fractal Dimensions of Networks the theory and computation of the most important of these dimensions are reviewed, including the box counting dimension, the correlation dimension, the mass dimension, the transfinite fractal dimension, the information dimension, the generalized dimensions (which provide a way to describe multifractals), and the sandbox method (for approximating the generalized dimensions). The book describes the use of diameter-based and radius-based boxes, and presents several heuristic methods for box counting, including greedy coloring, random sequential node burning, and a method for computing a lower bound. We also discuss very recent results on resolving ambiguity in the calculation of the information dimension and the generalized dimensions, and on the non-monotonicity of the generalized dimensions. Anyone interested in the theory and application of networks will want to read this Brief. This includes anyone studying, e.g., social networks, telecommunications networks, transportation networks, ecological networks, food chain networks, network models of the brain, or financial networks.
Survey of Operating Systems (Fifth Edition)
by Jane Holcombe Charles HolcombeInformation technology (IT) offers many career paths, leading to occupations in such fields as PC repair, network administration, telecommunications, Web development, graphic design, and desktop support. To become competent in any IT field, however, you need certain basic computer skills. This book will help you build a foundation for success in the IT field by introducing you to fundamental information about desktop operating systems, a needed basis for working with computers at any level.
A Survey on 3D Cameras: Metrological Comparison of Time-of-Flight, Structured-Light and Active Stereoscopy Technologies (SpringerBriefs in Computer Science)
by Silvio Giancola Matteo Valenti Remo SalaThis book is a valuable resource to deeply understand the technology used in 3D cameras. In this book, the authors summarize and compare the specifications of the main 3D cameras available in the mass market. The authors present a deep metrological analysis of the main camera based on the three main technologies: Time-of-Flight, Structured-Light and Active Stereoscopy, and provide qualitative results for any user to understand the underlying technology within 3D camera, as well as practical guidance on how to get the most of them for a given application.