Blockchain, Big Data and Machine Learning
Present book covers new paradigms in Blockchain, Big Data and Machine Learning concepts including applications and case studies. It explains dead fusion in realizing the privacy and security of blockchain based data analytic environment. Recent research of security based on big data, blockchain and machine learning has been explained through actual work by practitioners and researchers, including their technical evaluation and comparison with existing technologies. The theoretical background and experimental case studies related to real-time environment are covered as well. Aimed at Senior undergraduate students, researchers and professionals in computer science and engineering and electrical engineering, this book: Converges Blockchain, Big Data and Machine learning in one volume. Connects Blockchain technologies with the data centric applications such Big data and E-Health. Easy to understand examples on how to create your own blockchain supported by case studies of blockchain in different industries. Covers big data analytics examples using R. Includes lllustrative examples in python for blockchain creation.
Dataset Shift in Machine Learning
An overview of recent efforts in the machine learning community to deal with dataset and covariate shift, which occurs when test and training inputs and outputs have different distributions. Dataset shift is a common problem in predictive modeling that occurs when the joint distribution of inputs and outputs differs between training and test stages. Covariate shift, a particular case of dataset shift, occurs when only the input distribution changes. Dataset shift is present in most practical applications, for reasons ranging from the bias introduced by experimental design to the irreproducibility of the testing conditions at training time. (An example is -email spam filtering, which may fail to recognize spam that differs in form from the spam the automatic filter has been built on.) Despite this, and despite the attention given to the apparently similar problems of semi-supervised learning and active learning, dataset shift has received relatively little attention in the machine learning community until recently. This volume offers an overview of current efforts to deal with dataset and covariate shift. The chapters offer a mathematical and philosophical introduction to the problem, place dataset shift in relationship to transfer learning, transduction, local learning, active learning, and semi-supervised learning, provide theoretical views of dataset and covariate shift (including decision theoretic and Bayesian perspectives), and present algorithms for covariate shift. Contributors Shai Ben-David, Steffen Bickel, Karsten Borgwardt, Michael Br羹ckner, David Corfield, Amir Globerson, Arthur Gretton, Lars Kai Hansen, Matthias Hein, Jiayuan Huang, Choon Hui Teo, Takafumi Kanamori, Klaus-Robert M羹ller, Sam Roweis, Neil Rubens, Tobias Scheffer, Marcel Schmittfull, Bernhard Sch繹lkopf Hidetoshi Shimodaira, Alex Smola, Amos Storkey, Masashi Sugiyama
Telepresence: Actual and Virtual
Telepresence: Actual and Virtual explores the history of telepresence from the 1948 developments of master-slave manipulation, through to current telepresence technology used in space, undersea, surgery and telemedicine, operations in nuclear and other hazardous environments, policing and surveillance, agriculture, construction, mining, warehousing, education, amusement, social media, and other contexts. It also describes the various operator hand and body controls and the corresponding telerobotic actuation of robotic hands, arms, and locomotion. This book reviews the sensing and control technology, its history and likely future, and discusses the many research and policy issues that are raised. The book also takes up key questions relating to social and ethical issues, given that a person's mechanical reach is becoming unlimited, enabling one to perform mischievous or harmful acts without identification, and what that portends for future developments in telepresence, including regulation and recommended directions of development. The primary audience for this book is professionals interested in human-robot interaction, human factors engineering, virtual reality, applications to space and undersea exploration, telemedicine and telesurgery, firefighting, mechanized agriculture, policing, drone surveillance, warehouse parts' fetching, mining, and military operations.
Introduction to the Cyber Ranges
Introduction to the Cyber Ranges provides a comprehensive, integrative, easy-to-comprehend overview of different aspects involved in the cybersecurity arena. It expands on various concepts like cyber situational awareness, simulation and emulation environments, and cybersecurity exercises. It also focuses on detailed analysis and the comparison of various existing cyber ranges in military, academic, and commercial sectors. It highlights every crucial aspect necessary for developing a deeper insight about the working of the cyber ranges, their architectural design, and their need in the market. It conveys how cyber ranges are complex and effective tools in dealing with advanced cyber threats and attacks. Enhancing the network defenses, resilience, and efficiency of different components of critical infrastructures is the principal objective of cyber ranges. Cyber ranges provide simulations of possible cyberattacks and training on how to thwart such attacks. They are widely used in urban enterprise sectors because they present a sturdy and secure setting for hands-on cyber skills training, advanced cybersecurity education, security testing/training, and certification. Features: A comprehensive guide to understanding the complexities involved with cyber ranges and other cybersecurity aspects Substantial theoretical knowhow on cyber ranges, their architectural design, along with case studies of existing cyber ranges in leading urban sectors like military, academic, and commercial Elucidates the defensive technologies used by various cyber ranges in enhancing the security setups of private and government organizations Information organized in an accessible format for students (in engineering, computer science, and information management), professionals, researchers, and scientists working in the fields of IT, cybersecurity, distributed systems, and computer networks
Designing Secure Iot Devices with the Arm Platform Security Architecture and Cortex-M33
Designing Secure IoT devices with the Arm Platform Security Architecture and Cortex-M33 explains how to design and deploy secure IoT devices based on the Cortex-M23/M33 processor. The book is split into three parts. First, it introduces the Cortex-M33 and its architectural design and major processor peripherals. Second, it shows how to design secure software and secure communications to minimize the threat of both hardware and software hacking. And finally, it examines common IoT cloud systems and how to design and deploy a fleet of IoT devices. Example projects are provided for the Keil MDK-ARM and NXP LPCXpresso tool chains. Since their inception, microcontrollers have been designed as functional devices with a CPU, memory and peripherals that can be programmed to accomplish a huge range of tasks. With the growth of internet connected devices and the Internet of Things (IoT), "plain old microcontrollers" are no longer suitable as they lack the features necessary to create both a secure and functional device. The recent development by ARM of the Cortex M23 and M33 architecture is intended for today's IoT world.
Supervised Machine Learning
AI framework intended to solve a problem of bias-variance tradeoff for supervised learning methods in real-life applications. The AI framework comprises of bootstrapping to create multiple training and testing data sets with various characteristics, design and analysis of statistical experiments to identify optimal feature subsets and optimal hyper-parameters for ML methods, data contamination to test for the robustness of the classifiers. Key Features: Using ML methods by itself doesn't ensure building classifiers that generalize well for new data Identifying optimal feature subsets and hyper-parameters of ML methods can be resolved using design and analysis of statistical experiments Using a bootstrapping approach to massive sampling of training and tests datasets with various data characteristics (e.g.: contaminated training sets) allows dealing with bias Developing of SAS-based table-driven environment allows managing all meta-data related to the proposed AI framework and creating interoperability with R libraries to accomplish variety of statistical and machine-learning tasks Computer programs in R and SAS that create AI framework are available on GitHub
Mobile Microservices
In the 5G era, edge computing and new ecosystems of mobile microservices enable new business models, strategies, and competitive advantage. Focusing on microservices, this book introduces the essential concepts, technologies, and trade-offs in the edge computing architectural stack, providing for widespread adoption and dissemination. The book elucidates the concepts, architectures, well-defined building blocks, and prototypes for mobile microservice platforms and pervasive application development, as well as the implementation and configuration of service middleware and AI-based microservices. A goal-oriented service composition model is then proposed by the author, allowing for an economic assessment of connected, smart mobile services. Based on this model, costs can be minimized through statistical workload aggregation effects or backhaul data transport reduction, and customer experience and safety can be enhanced through reduced response times.This title will be a useful guide for students and IT professionals to get started with microservices and when studying the use of microservices in pervasive applications. It will also appeal to researchers and students studying software architecture and service-oriented computing, and especially those interested in edge computing, pervasive computing, the Internet of Things, and mobile microservices.
Blockchain for Iot
Blockchain for IoT provides the basic concepts of Blockchain technology and its applications to varied domains catering to socio-technical fields. It also introduces intelligent Blockchain platforms by way of infusing elements of computational intelligence into Blockchain technology. With the help of an interdisciplinary approach, it includes insights into real-life IoT applications to enable the readers to assimilate the concepts with ease. This book provides a balanced approach between theoretical understanding and practical applications.Features: A self-contained approach to integrating the principles of Blockchain with elements of computational intelligence A rich and novel foundation of Blockchain technology with reference to the internet of things conjoined with the tenets of artificial intelligence in yielding intelligent Blockchain platforms Elucidates essential background, concepts, definitions, and theories thereby putting forward a complete treatment on the subject Information presented in an accessible way for research students of computer science and information technology, as well as software professionals who can inherit the much-needed developmental ideas to boost up their computing knowledge on distributed platforms This book is aimed primarily at undergraduates, postgraduates, and researchers studying Blockchain.
Object Detection with Deep Learning Models
Object Detection with Deep Learning Models discusses recent advances in object detection and recognition using deep learning methods, which have achieved great success in the field of computer vision and image processing. It provides a systematic and methodical overview of the latest developments in deep learning theory and its applications to computer vision, illustrating them using key topics, including object detection, face analysis, 3D object recognition, and image retrieval.The book offers a rich blend of theory and practice. It is suitable for students, researchers and practitioners interested in deep learning, computer vision and beyond and can also be used as a reference book. The comprehensive comparison of various deep-learning applications helps readers with a basic understanding of machine learning and calculus grasp the theories and inspires applications in other computer vision tasks.Features: A structured overview of deep learning in object detection A diversified collection of applications of object detection using deep neural networks Emphasize agriculture and remote sensing domains Exclusive discussion on moving object detection
Internet of Things
Today, Internet of Things (IoT) is ubiquitous as it is applied in practice in everything from Industrial Control Systems (ICS) to e-Health, e-commerce, Cyber Physical Systems (CPS), smart cities, smart parking, healthcare, supply chain management and many more. Numerous industries, academics, alliances and standardization organizations make an effort on IoT standardization, innovation and development. But there is still a need for a comprehensive framework with integrated standards under one IoT vision. Furthermore, the existing IoT systems are vulnerable to huge range of malicious attacks owing to the massive numbers of deployed IoT systems, inadequate data security standards and the resource-constrained nature. Existing security solutions are insufficient and therefore it is necessary to enable the IoT devices to dynamically counter the threats and save the system.Apart from illustrating the diversified IoT applications, this book also addresses the issue of data safekeeping along with the development of new security-enhancing schemes such as blockchain, as well as a range of other advances in IoT. The reader will discover that the IoT facilitates a multidisciplinary approach dedicated to create novel applications and develop integrated solutions to build a sustainable society. The innovative and fresh advances that demonstrate IoT and computational intelligence in practice are discussed in this book, which will be helpful and informative for scientists, research scholars, academicians, policymakers, industry professionals, government organizations and others.This book is intended for a broad target audience, including scholars of various generations and disciplines, recognized scholars (lecturers and professors) and young researchers (postgraduate and undergraduates) who study the legal and socio-economic consequences of the emergence and dissemination of digital technologies such as IoT. Furthermore, the book is intended for researchers, developers and operators working in the field of IoT and eager to comprehend the vulnerability of the IoT paradigm. The book will serve as a comprehensive guide for the advanced-level students in computer science who are interested in understanding the severity and implications of the accompanied security issues in IoT.Dr. Bharat Bhushan is an Assistant Professor of Department of Computer Science and Engineering (CSE) at School of Engineering and Technology, Sharda University, Greater Noida, India.Prof. (Dr.) Sudhir Kumar Sharma is currently a Professor and Head of the Department of Computer Science, Institute of Information Technology & Management affiliated to GGSIPU, New Delhi, India.Prof. (Dr.) Bhuvan Unhelkar (BE, MDBA, MSc, PhD; FACS; PSM-I, CBAP(R)) is an accomplished IT professional and Professor of IT at the University of South Florida, Sarasota-Manatee (Lead Faculty).Dr. Muhammad Fazal Ijaz is working as an Assistant Professor in Department of Intelligent Mechatronics Engineering, Sejong University, Seoul, Korea.Prof. (Dr.) Lamia Karim is a professor of computer science at the National School of Applied Sciences Berrechid (ENSAB), Hassan 1st University.
Deep Learning in Computer Vision
Deep learning algorithms have brought a revolution to the computer vision community by introducing non-traditional and efficient solutions to several image-related problems that had long remained unsolved or partially addressed. This book presents a collection of eleven chapters where each individual chapter explains the deep learning principles of a specific topic, introduces reviews of up-to-date techniques, and presents research findings to the computer vision community. The book covers a broad scope of topics in deep learning concepts and applications such as accelerating the convolutional neural network inference on field-programmable gate arrays, fire detection in surveillance applications, face recognition, action and activity recognition, semantic segmentation for autonomous driving, aerial imagery registration, robot vision, tumor detection, and skin lesion segmentation as well as skin melanoma classification. The content of this book has been organized such that each chapter can be read independently from the others. The book is a valuable companion for researchers, for postgraduate and possibly senior undergraduate students who are taking an advanced course in related topics, and for those who are interested in deep learning with applications in computer vision, image processing, and pattern recognition.
Artificial Intelligence in a Throughput Model
This book provides an overview of the existing biometric technologies, decision-making algorithms and the growth opportunity in biometrics. The book proposes a throughput model, which draws on computer science, economics and psychology to model perceptual, informational sources, judgmental processes and decision choice algorithms.
Machine Learning for Automated Theorem Proving
Automated theorem proving represents a significant and long-standing area of research in computer science, with numerous applications. A large proportion of the methods developed to date for the implementation of automated theorem provers (ATPs) have been algorithmic, sharing a great deal in common with the wider study of heuristic search algorithms. However, in recent years researchers have begun to incorporate machine learning (ML) methods into ATPs in an effort to extract better performance. Propositional satisfiability (SAT) solving and machine learning are both large and longstanding areas of research, and each has a correspondingly large literature. In this book, the author presents the results of his thorough and systematic review of the research at the intersection of these two apparently rather unrelated fields. It focusses on the research that has appeared to date on incorporating ML methods into solvers for propositional satisfiability SAT problems, and also solvers for its immediate variants such as and quantified SAT (QSAT). The comprehensiveness of the coverage means that ML researchers gain an understanding of state-of-the-art SAT and QSAT solvers that is sufficient to make new opportunities for applying their own ML research to this domain clearly visible, while ATP researchers gain a clear appreciation of how state-of-the-art machine learning might help them to design better solvers. In presenting the material, the author concentrates on the learning methods used and the way in which they have been incorporated into solvers. This enables researchers and students in both Automated Theorem Proving and Machine Learning to a) know what has been tried and b) understand the often complex interaction between ATP and ML that is needed for success in these undeniably challenging applications.
Big Data Management in Sensing - Applications in AI and Iot
The book is centrally focused on human computer Interaction and how sensors within small and wide groups of Nano-robots employ Deep Learning for applications in industry. It covers a wide array of topics that are useful for researchers and students to gain knowledge about AI and sensors in nanobots. Furthermore, the book explores Deep Learning approaches to enhance the accuracy of AI systems applied in medical robotics for surgical techniques. Secondly, we plan to explore bio-nano-robotics, which is a field in nano-robotics, that deals with automatic intelligence handling, self-assembly and replication, information processing and programmability.
What Every Engineer Should Know About the Internet of Things
This practical text provides an introduction to IoT that can be understood by every engineering discipline and discusses detailed applications of IoT.
Computational Engineering
Computational engineering is a promising and emerging field that deals with the development of models for providing high performance computing, to analyse designs and fix complex problems. Its framework includes data science for developing algorithms and mathematical foundations like fourier analysis and discrete fourier transforms. This book integrates physical and experimental approaches applied in the development of the discipline. It includes comprehensive techniques and applications to fabricate structures and networks. It focuses upon applied mathematics, computer modelling and other related fields. This text is an asset for anyone who is interested in the field of computational engineering.
Innovations in Computer Science and Engineering
Rapid technological changes have led to new innovations in computer science and engineering. The ever growing need for advanced technology has fueled the research in the fields of computing, signal processing and embedded systems. This book examines various studies that are constantly contributing towards advancing technologies and brings forth new areas for future research. This book is an attempt to provide in-depth knowledge about the theory and practice of mobile computing, robotics and industrial electronics. It will provide comprehensive knowledge to the readers.
Computer Engineering
Computer engineering is a rapidly evolving field that integrates computer science and electrical engineering. Some of the diverse topics covered in this book address the varied branches that fall within the scope of this subject by discussing concepts like multimedia, embedded systems, computer networking and language programming, microprocessors, etc. It is a compilation of valuable researches and case-studies by eminent experts from around the world that aim to explain the most significant concepts and advancements in the above mentioned fields. It will help the readers in keeping pace with the rapid changes in this discipline.
Spectral Methods for Data Science
In contemporary science and engineering applications, the volume of available data is growing at an enormous rate. Spectral methods have emerged as a simple yet surprisingly effective approach for extracting information from massive, noisy and incomplete data. A diverse array of applications have been found in machine learning, imaging science, financial and econometric modeling, and signal processing. This monograph presents a systematic, yet accessible introduction to spectral methods from a modern statistical perspective, highlighting their algorithmic implications in diverse large-scale applications. The authors provide a unified and comprehensive treatment that establishes the theoretical underpinnings for spectral methods, particularly through a statistical lens. Building on years of research experience in the field, the authors present a powerful framework, called leave-one-out analysis, that proves effective and versatile for delivering fine-grained performance guarantees for a variety of problems. This book is essential reading for all students, researchers and practitioners working in Data Science.
Fundamentals of Machine Learning
The scientific study of statistical models and algorithms that computer systems use in order to perform a specific task without any explicit instructions is referred to as machine learning. It relies on patterns and inference. Machine learning is a subset of artificial intelligence. The study of mathematical optimization contributes significantly to the methods, applications and theory of machine learning. Some of the different models, which are used within this field are artificial neural networks, decision trees and Bayesian networks. Machine learning is applied in various other fields such as in machine perception, agriculture, adaptive websites, bioinformatics, optimization, sentiment analysis, etc. The topics included in this book on machine learning are of utmost significance and bound to provide incredible insights to readers. It unfolds the innovative aspects of this field, which will be crucial for the progress of this field in the future. Those in search of information to further their knowledge will be greatly assisted by this book.
Tensor Regression
Regression analysis is a key area of interest in the field of data analysis and machine learning which is devoted to exploring the dependencies between variables, often using vectors. The emergence of high dimensional data in technologies such as neuroimaging, computer vision, climatology and social networks, has brought challenges to traditional data representation methods. Tensors, as high dimensional extensions of vectors, are considered as natural representations of high dimensional data. In this book, the authors provide a systematic study and analysis of tensor-based regression models and their applications in recent years. It groups and illustrates the existing tensor-based regression methods and covers the basics, core ideas, and theoretical characteristics of most tensor-based regression methods. In addition, readers can learn how to use existing tensor-based regression methods to solve specific regression tasks with multiway data, what datasets can be selected, and what software packages are available to start related work as soon as possible. Tensor Regression is the first thorough overview of the fundamentals, motivations, popular algorithms, strategies for efficient implementation, related applications, available datasets, and software resources for tensor-based regression analysis. It is essential reading for all students, researchers and practitioners of working on high dimensional data.
Handbook of Automated Scoring
"Automated scoring engines [...] require a careful balancing of the contributions of technology, NLP, psychometrics, artificial intelligence, and the learning sciences. The present handbook is evidence that the theories, methodologies, and underlying technology that surround automated scoring have reached maturity, and that there is a growing acceptance of these technologies among experts and the public." From the Foreword by Alina von Davier, ACTNext Senior Vice PresidentHandbook of Automated Scoring: Theory into Practice provides a scientifically grounded overview of the key research efforts required to move automated scoring systems into operational practice. It examines the field of automated scoring from the viewpoint of related scientific fields serving as its foundation, the latest developments of computational methodologies utilized in automated scoring, and several large-scale real-world applications of automated scoring for complex learning and assessment systems. The book is organized into three parts that cover (1) theoretical foundations, (2) operational methodologies, and (3) practical illustrations, each with a commentary. In addition, the handbook includes an introduction and synthesis chapter as well as a cross-chapter glossary.
Introduction to Wavelet Transforms
The textbook, Introduction to Wavelet Transforms provides basics of wavelet transforms in a self-contained manner. Applications of wavelet transform theory permeate our daily lives. Therefore it is imperative to have a strong foundation for this subject.FeaturesNo prior knowledge of the subject is assumed. Sufficient mathematical background is provided to complete the discussion of different topics.Different topics have been properly segmented for easy learning. This makes the textbook pedagogical and unique.Notation is generally introduced in the definitions. Relatively easy consequences of the definitions are listed as observations, and important results are stated as theorems.Examples are provided for clarity and to enhance reader's understanding of the subject.Each chapter also has a problem section. A majority of the problems are provided with sufficient hints.The textbook can be used either in an upper-level undergraduate or first-year graduate class in electrical engineering, or computer science, or applied mathematics. It can also be used by professionals and researchers in the field who would like a quick review of the basics of the subject.About the AuthorNirdosh Bhatnagar works in both academia and industry in Silicon Valley, California. He is also the author of a comprehensive two-volume work: Mathematical Principles of the Internet, published by the CRC Press in the year 2019. Nirdosh earned M.S. in Operations Research, and M.S. and Ph.D. in electrical engineering, all from Stanford University, Stanford, California.
Construct Theory
In earlier work I showed there is every reason to consider biological life and AI are not only mathematical constructs, but that they are described in terms of one another. Here I introduce the what I call The Delta-Phi function. When we say biological creation is natural, we don't say that about artificial intelligence, though we put the naturally occurring elements together to give them electronic logic, these elements actually were made in the interior of stars just like the biological life elements.
Minimum-Distortion Embedding
Embeddings provide concrete numerical representations of otherwise abstract items, for use in downstream tasks. For example, a biologist might look for subfamilies of related cells by clustering embedding vectors associated with individual cells, while a machine learning practitioner might use vector representations of words as features for a classification task. In this monograph the authors present a general framework for faithful embedding called minimum-distortion embedding (MDE) that generalizes the common cases in which similarities between items are described by weights or distances. The MDE framework is simple but general. It includes a wide variety of specific embedding methods, including spectral embedding, principal component analysis, multidimensional scaling, Euclidean distance problems, etc. The authors provide a detailed description of minimum-distortion embedding problem and describe the theory behind creating solutions to all aspects. They also give describe in detail algorithms for computing minimum-distortion embeddings. Finally, they provide examples on how to approximately solve many MDE problems involving real datasets, including images, co-authorship networks, United States county demographics, population genetics, and single-cell mRNA transcriptomes. An accompanying open-source software package, PyMDE, makes it easy for practitioners to experiment with different embeddings via different choices of distortion functions and constraint sets. The theory and techniques described and illustrated in this book will be of interest to researchers and practitioners working on modern-day systems that look to adopt cutting-edge artificial intelligence.
Machine Learning in Healthcare
Artificial intelligence (AI) and machine learning (ML) techniques play an important role in our daily lives by enhancing predictions and decision-making for the public in several fields such as financial services, real estate business, consumer goods, social media, etc. Despite several studies that have proved the efficacy of AI/ML tools in providing improved healthcare solutions, it has not gained the trust of health-care practitioners and medical scientists. This is due to poor reporting of the technology, variability in medical data, small datasets, and lack of standard guidelines for application of AI. Therefore, the development of new AI/ML tools for various domains of medicine is an ongoing field of research. Machine Learning in Healthcare: Fundamentals and Recent Applications discusses how to build various ML algorithms and how they can be applied to improve healthcare systems. Healthcare applications of AI are innumerable: medical data analysis, early detection and diagnosis of disease, providing objective-based evidence to reduce human errors, curtailing inter- and intra-observer errors, risk identification and interventions for healthcare management, real-time health monitoring, assisting clinicians and patients for selecting appropriate medications, and evaluating drug responses. Extensive demonstrations and discussion on the various principles of machine learning and its application in healthcare is provided, along with solved examples and exercises. This text is ideal for readers interested in machine learning without any background knowledge and looking to implement machine-learning models for healthcare systems.
Software Architecture for Busy Developers
A quick start guide to learning essential software architecture tools, frameworks, design patterns, and best practicesKey Features: Apply critical thinking to your software development and architecture practices and bring structure to your approach using well-known IT standardsUnderstand the impact of cloud-native approaches on software architectureIntegrate the latest technology trends into your architectural designsBook Description: Are you a seasoned developer who likes to add value to a project beyond just writing code? Have you realized that good development practices are not enough to make a project successful, and you now want to embrace the bigger picture in the IT landscape? If so, you're ready to become a software architect; someone who can deal with any IT stakeholder as well as add value to the numerous dimensions of software development.The sheer volume of content on software architecture can be overwhelming, however. Software Architecture for Busy Developers is here to help. Written by St矇phane Eyskens, author of The Azure Cloud Native Mapbook, this book guides you through your software architecture journey in a pragmatic way using real-world scenarios. By drawing on over 20 years of consulting experience, St矇phane will help you understand the role of a software architect, without the fluff or unnecessarily complex theory.You'll begin by understanding what non-functional requirements mean and how they concretely impact target architecture. The book then covers different frameworks used across the entire enterprise landscape with the help of use cases and examples. Finally, you'll discover ways in which the cloud is becoming a game changer in the world of software architecture.By the end of this book, you'll have gained a holistic understanding of the architectural landscape, as well as more specific software architecture skills. You'll also be ready to pursue your software architecture journey on your own - and in just one weekend!What You Will Learn: Understand the roles and responsibilities of a software architectExplore enterprise architecture tools and frameworks such as The Open Group Architecture Framework (TOGAF) and ArchiMateGet to grips with key design patterns used in software developmentExplore the widely adopted Architecture Tradeoff Analysis Method (ATAM)Discover the benefits and drawbacks of monoliths, service-oriented architecture (SOA), and microservicesStay on top of trending architectures such as API-driven, serverless, and cloud nativeWho this book is for: This book is for developers who want to move up the organizational ladder and become software architects by understanding the broader application landscape and discovering how large enterprises deal with software architecture practices. Prior knowledge of software development is required to get the most out of this book.
Artificial Intelligence Techniques in IoT Sensor Networks
Artificial Intelligence Techniques in IoT Sensor Networks is a technical book which can be read by researchers, academicians, students and professionals interested in artificial intelligence (AI), sensor networks and Internet of Things (IoT). This book is intended to develop a shared understanding of applications of AI techniques in the present and near term. The book maps the technical impacts of AI technologies, applications and their implications on the design of solutions for sensor networks. This text introduces researchers and aspiring academicians to the latest developments and trends in AI applications for sensor networks in a clear and well-organized manner. It is mainly useful for research scholars in sensor networks and AI techniques. In addition, professionals and practitioners working on the design of real-time applications for sensor networks may benefit directly from this book. Moreover, graduate and master's students of any departments related to AI, IoT and sensor networks can find this book fascinating for developing expert systems or real-time applications. This book is written in a simple and easy language, discussing the fundamentals, which relieves the requirement of having early backgrounds in the field. From this expectation and experience, many libraries will be interested in owning copies of this work.
Soft Computing Techniques in Engineering, Health, Mathematical and Social Sciences
Soft computing techniques are no longer limited to the arena of computer science. The discipline has an exponentially growing demand in other branches of science and engineering and even into health and social science. This book contains theory and applications of soft computing in engineering, health, and social and applied sciences. Different soft computing techniques such as artificial neural networks, fuzzy systems, evolutionary algorithms and hybrid systems are discussed. It also contains important chapters in machine learning and clustering. This book presents a survey of the existing knowledge and also the current state of art development through original new contributions from the researchers. This book may be used as a one-stop reference book for a broad range of readers worldwide interested in soft computing. In each chapter, the preliminaries have been presented first and then the advanced discussion takes place. Learners and researchers from a wide variety of backgrounds will find several useful tools and techniques to develop their soft computing skills. This book is meant for graduate students, faculty and researchers willing to expand their knowledge in any branch of soft computing. The readers of this book will require minimum prerequisites of undergraduate studies in computation and mathematics.
A First Course in Artificial Intelligence
The importance of Artificial Intelligence cannot be over-emphasised in current times, where automation is already an integral part of industrial and business processes.A First Course in Artificial Intelligence is a comprehensive textbook for beginners which covers all the fundamentals of Artificial Intelligence. Seven chapters (divided into thirty-three units) introduce the student to key concepts of the discipline in simple language, including expert system, natural language processing, machine learning, machine learning applications, sensory perceptions (computer vision, tactile perception) and robotics. Each chapter provides information in separate units about relevant history, applications, algorithm and programming with relevant case studies and examples. The simplified approach to the subject enables beginners in computer science who have a basic knowledge of Java programming to easily understand the contents. The text also introduces Python programming language basics, with demonstrations of natural language processing. It also introduces readers to the Waikato Environment for Knowledge Analysis (WEKA), as a tool for machine learning.The book is suitable for students and teachers involved in introductory courses in undergraduate and diploma level courses which have appropriate modules on artificial intelligence.
Advanced Controls for Intelligent Buildings
This book focuses primarily on both technical and business aspects needed to select, design, develop and deploy control application (or product) successfully for multiple components in building systems. Designing and deploying a control application require multiple steps such as sensing, system dynamics modelling, algorithms, and testing. This may involve choosing an appropriate methodology and technique at multiple stages during the development process. Understanding the pros and cons of such techniques, most importantly being aware of practically possible approaches in the entire ecosystem, is critical in choosing the best framework and system application for different parts of building systems. Providing a wide overview of the state-of art in controls and building systems, providing guidance on developing an end-to-end system in relation to business fundamentals (distribution channels, stakeholders, marketing, supply-chain and financial management), the book is ideal for fourth-year control/mechanical/electrical engineering undergraduates, graduate students, and practitioners including business leaders concerned with smart building technology.
Advanced Controls for Intelligent Buildings
This book focuses primarily on both technical and business aspects needed to select, design, develop and deploy control application (or product) successfully for multiple components in building systems. Designing and deploying a control application require multiple steps such as sensing, system dynamics modelling, algorithms, and testing. This may involve choosing an appropriate methodology and technique at multiple stages during the development process. Understanding the pros and cons of such techniques, most importantly being aware of practically possible approaches in the entire ecosystem, is critical in choosing the best framework and system application for different parts of building systems. Providing a wide overview of the state-of art in controls and building systems, providing guidance on developing an end-to-end system in relation to business fundamentals (distribution channels, stakeholders, marketing, supply-chain and financial management), the book is ideal for fourth-year control/mechanical/electrical engineering undergraduates, graduate students, and practitioners including business leaders concerned with smart building technology.
Coefficient of Variation and Machine Learning Applications
Coefficient of Variation (CV) is a unit free index indicating the consistency of the data associated with a real-world process and is simple to mold into computational paradigms. This book provides necessary exposure of computational strategies, properties of CV and extracting the metadata leading to efficient knowledge representation. It also compiles representational and classification strategies based on the CV through illustrative explanations. The potential nature of CV in the context of contemporary Machine Learning strategies and the Big Data paradigms is demonstrated through selected applications. Overall, this book explains statistical parameters and knowledge representation models.
Energy Management
This book introduces the principle of carrying out a medium term load forecast (MTLF) at power system level, based on the Big Data concept and Convolutionary Neural Network (CNNs). It presents further research directions in the field of Deep Learning techniques and Big Data, as well as how these two concepts are used in power engineering.
Advances and Open Problems in Federated Learning
The term Federated Learning was coined as recently as 2016 to describe a machine learning setting where multiple entities collaborate in solving a machine learning problem, under the coordination of a central server or service provider. Each client's raw data is stored locally and not exchanged or transferred; instead, focused updates intended for immediate aggregation are used to achieve the learning objective. Since then, the topic has gathered much interest across many different disciplines and the realization that solving many of these interdisciplinary problems likely requires not just machine learning but techniques from distributed optimization, cryptography, security, differential privacy, fairness, compressed sensing, systems, information theory, statistics, and more. This monograph has contributions from leading experts across the disciplines, who describe the latest state-of-the art from their perspective. These contributions have been carefully curated into a comprehensive treatment that enables the reader to understand the work that has been done and get pointers to where effort is required to solve many of the problems before Federated Learning can become a reality in practical systems. Researchers working in the area of distributed systems will find this monograph an enlightening read that may inspire them to work on the many challenging issues that are outlined. This monograph will get the reader up to speed quickly and easily on what is likely to become an increasingly important topic: Federated Learning.
Deep Learning in Gaming and Animations
Over the last decade, progress in deep learning has had a profound and transformational effect on many complex problems, including speech recognition, machine translation, natural language understanding, and computer vision. As a result, computers can now achieve human-competitive performance in a wide range of perception and recognition tasks. Many of these systems are now available to the programmer via a range of so-called cognitive services. More recently, deep reinforcement learning has achieved ground-breaking success in several complex challenges. This book makes an enormous contribution to this beautiful, vibrant area of study: an area that is developing rapidly both in breadth and depth. Deep learning can cope with a broader range of tasks (and perform those tasks to increasing levels of excellence). This book lays a good foundation for the core concepts and principles of deep learning in gaming and animation, walking you through the fundamental ideas with expert ease. This book progresses in a step-by-step manner. It reinforces theory with a full-fledged pedagogy designed to enhance students' understanding and offer them a practical insight into its applications. Also, some chapters introduce and cover novel ideas about how artificial intelligence (AI), deep learning, and machine learning have changed the world in gaming and animation. It gives us the idea that AI can also be applied in gaming, and there are limited textbooks in this area. This book comprehensively addresses all the aspects of AI and deep learning in gaming. Also, each chapter follows a similar structure so that students, teachers, and industry experts can orientate themselves within the text. There are few books in the field of gaming using AI. Deep Learning in Gaming and Animations teaches you how to apply the power of deep learning to build complex reasoning tasks. After being exposed to the foundations of machine and deep learning, you will use Python to build a bot and then teach it the game's rules. This book also focuses on how different technologies have revolutionized gaming and animation with various illustrations.
Background Modeling and Foreground Detection for Video Surveillance
This book provides a complete overview of the concepts, algorithms, and applications related to background modeling and foreground detection. It presents the top methods and algorithms for detecting moving objects in video surveillance. It covers statistical models, clustering models, neural networks, and fuzzy models. The book also addresses se
Energy Efficient Computing & Electronics
This book investigates new approaches to lower energy requirement in computing and provides comprehensive coverage of various technologies that can help achieve this goal. Chapters are written by international experts in their corresponding field.
Machine Learning Using TensorFlow Cookbook
Comprehensive recipes to give you valuable insights on Transformers, Reinforcement Learning, and moreKey Features: Deep Learning solutions from Kaggle Masters and Google Developer ExpertsGet to grips with the fundamentals including variables, matrices, and data sourcesLearn advanced techniques to make your algorithms faster and more accurateBook Description: The independent recipes in Machine Learning Using TensorFlow Cookbook will teach you how to perform complex data computations and gain valuable insights into your data. Dive into recipes on training models, model evaluation, sentiment analysis, regression analysis, artificial neural networks, and deep learning - each using Google's machine learning library, TensorFlow.This cookbook covers the fundamentals of the TensorFlow library, including variables, matrices, and various data sources. You'll discover real-world implementations of Keras and TensorFlow and learn how to use estimators to train linear models and boosted trees, both for classification and regression.Explore the practical applications of a variety of deep learning architectures, such as recurrent neural networks and Transformers, and see how they can be used to solve computer vision and natural language processing (NLP) problems.With the help of this book, you will be proficient in using TensorFlow, understand deep learning from the basics, and be able to implement machine learning algorithms in real-world scenarios.What You Will Learn: Take TensorFlow into productionImplement and fine-tune Transformer models for various NLP tasksApply reinforcement learning algorithms using the TF-Agents frameworkUnderstand linear regression techniques and use Estimators to train linear modelsExecute neural networks and improve predictions on tabular dataMaster convolutional neural networks and recurrent neural networks through practical recipesWho this book is for: If you are a data scientist or a machine learning engineer, and you want to skip detailed theoretical explanations in favor of building production-ready machine learning models using TensorFlow, this book is for you.Basic familiarity with Python, linear algebra, statistics, and machine learning is necessary to make the most out of this book.
IP Routing Protocols
This book discusses link-state routing protocols (OSPF and IS-IS), and the path-vector routing protocol (BGP). It covers their most identifying characteristics, operations, and the databases they maintain. Material is presented from a practicing engineer's perspective, linking theory and fundamental concepts to common practices and real-world examples. Every aspect of the book is written to reflect current best practices using real-world examples. The book begins with a detailed description of the OSPF area types and hierarchical routing, and the different types of routers used in an OSPF autonomous system. The author goes on to describe in detail the different OSPF packet types, and inbound and outbound processing of OSPF link-state advertisements (LSAs). Next, the book gives an overview of the main features of IS-IS. The author then discusses the two-level routing hierarchy for controlling the distribution of intra-domain (Level 1) and inter-domain (Level 2) routing information within an IS-IS routing domain. He then describes in detail IS-IS network address formats, IS-IS routing metrics, IS-IS packet types, IS-IS network types and adjacency formation, IS-IS LSDB and synchronization, and IS-IS authentication. The book then reviews the main concepts of path-vector routing protocols, and describes BGP packet types, BGP session states and Finite State Machine, BGP path attributes types, and BGP Autonomous System Numbers (ASNs). Focuses solely on link-state routing protocols (OSPF and IS-IS), and the only path-vector routing protocol in use today (BGP). Reviews the basic concepts underlying the design of IS-IS and provides a detailed description of IS-IS area types and hierarchical routing, and the different types of routers used by IS-IS. Discusses the two-level routing hierarchy for controlling the distribution of intra-domain (Level 1) and inter-domain (Level 2) routing information within an IS-IS routing domain. Describes in detail BGP packet types, BGP session states and Finite State Machine, BGP path attributes types, and BGP ASNs, includes a high-level view of the typical BGP router and its components, and inbound and outbound message processing. James Aweya, PhD, is a chief research scientist at the Etisalat British Telecom Innovation Center (EBTIC), Khalifa University, Abu Dhabi, UAE. He has authored four books including this book and is a senior member of the Institute of Electrical and Electronics Engineers (IEEE).
IP Routing Protocols
This book focuses on the fundamental concepts of IP routing and distance-vector routing protocols (RIPv2 and EIGRP). It discusses routing protocols from a practicing engineer's perspective, linking theory and fundamental concepts to common practices and everyday examples. The book benefits and reflects the author's more than 22 years of designing and working with IP routing devices and protocols (and Telecoms systems, in general). Every aspect of the book is written to reflect current best practices using real-world examples. This book describes the various methods used by routers to learn routing information. The author includes discussion of the characteristics of the different dynamic routing protocols, and how they differ in design and operation. He explains the processing steps involved in forwarding IP packets through an IP router to their destination and discusses the various mechanisms IP routers use for controlling routing in networks. The discussion is presented in a simple style to make it comprehensible and appealing to undergraduate and graduate level students, research and practicing engineers, scientists, IT personnel, and network engineers. It is geared toward readers who want to understand the concepts and theory of IP routing protocols, through real-world example systems and networks. Focuses on the fundamental concepts of IP routing and distance-vector routing protocols (RIPv2 and EIGRP). Describes the various methods used by routers to learn routing information. Includes discussion of the characteristics of the different dynamic routing protocols, and how they differ in design and operation. Provides detailed descriptions of the most common distance-vector routing protocols RIPv2 and EIGRP. Discusses the various mechanisms IP routers use for controlling routing in networks. James Aweya, PhD, is a chief research scientist at the Etisalat British Telecom Innovation Center (EBTIC), Khalifa University, Abu Dhabi, UAE. He has authored four books including this book and is a senior member of the Institute of Electrical and Electronics Engineers (IEEE).
Magnetic Core Memory Decoded
Magnetic Core Memory Decoded is a detailed work describing the operation and development of a magnetic core memory system of the type originally implemented in the 1940's through to the 1960's.Core memory was a major stepping stone in the development of modern digital computer systems and is a fascinating technology which encompasses many engineering disciplines.A full explanation of the technology is provided from the basics of magnetic core flux responses through the design and implementation of circuits required to create a fully functional memory system.The system presented in this book is a non-trivial design and while it is relatively small in terms of its storage capacity it is still large enough to give the reader a full account of the technology and the amazing secrets of this technology.This book is a must for anyone interested in the history of computing or is simply interested in the development of engineering technology.
Swarm Intelligence Algorithms
Swarm intelligence algorithms are a form of nature-based optimization algorithms. Their main inspiration is the cooperative behavior of animals within specific communities. This can be described as simple behaviors of individuals along with the mechanisms for sharing knowledge between them, resulting in the complex behavior of the entire community. Examples of such behavior can be found in ant colonies, bee swarms, schools of fish or bird flocks. Swarm intelligence algorithms are used to solve difficult optimization problems for which there are no exact solving methods or the use of such methods is impossible, e.g. due to unacceptable computational time. This book thoroughly presents the basics of 24 algorithms selected from the entire family of swarm intelligence algorithms. Each chapter deals with a different algorithm describing it in detail and showing how it works in the form of a pseudo-code. In addition, the source code is provided for each algorithm in Matlab and in the C ++ programming language. In order to better understand how each swarm intelligence algorithm works, a simple numerical example is included in each chapter, which guides the reader step by step through the individual stages of the algorithm, showing all necessary calculations. This book can provide the basics for understanding how swarm intelligence algorithms work, and aid readers in programming these algorithms on their own to solve various computational problems. This book should also be useful for undergraduate and postgraduate students studying nature-based optimization algorithms, and can be a helpful tool for learning the basics of these algorithms efficiently and quickly. In addition, it can be a useful source of knowledge for scientists working in the field of artificial intelligence, as well as for engineers interested in using this type of algorithms in their work. If the reader already has basic knowledge of swarm intelligence algorithms, we recommend the book: "Swarm Intelligence Algorithms: Modifications and Applications" (Edited by A. Slowik, CRC Press, 2020), which describes selected modifications of these algorithms and presents their practical applications.
Covid-19 Public Health Measures
Considering the overall situation of the current pandemic and pertinent recommendations, this book focuses on the use of augmented reality (AR) applications for preventing COVID-19 outbreaks along with techniques, tools, and platforms to achieve social distancing.and sanitization. COVID-19 Public Health Measures: An Augmented Reality Perspective contains theoretical and practical knowledge of AR and remedies on how to cope with the pandemic, including multiple use cases along with a set of recommendations. This book illustrates application building using open-source software with an interactive interface to aid impaired users. The initial part of this book emphasizes the basic knowledge of AR, technology, devices, and rest of the relevant theories. This book is aimed at researchers, students of AR, technical healthcare professionals, and practitioners. Key Features: - Consists of an extensive introduction to the terminologies and components of AR - Provides in-depth knowledge of various tools and techniques used in AR - Introduces various platforms and software development kits (SDKs) such as Unity Engine, Unreal Engine, and Vuforia - Gives a step-by-step guide for the development of an AR app - Describes how AR can be used specifically by impaired users not only in the situation of current pandemic but also in normal situations thus simplifying day-to-day activities
Swarm Intelligence Algorithms
Nature-based algorithms play an important role among artificial intelligence algorithms. Among them are global optimization algorithms called swarm intelligence algorithms. These algorithms that use the behavior of simple agents and various ways of cooperation between them, are used to solve specific problems that are defined by the so-called objective function. Swarm intelligence algorithms are inspired by the social behavior of various animal species, e.g. ant colonies, bird flocks, bee swarms, schools of fish, etc. The family of these algorithms is very large and additionally includes various types of modifications to enable swarm intelligence algorithms to solve problems dealing with areas other than those for which they were originally developed.This book presents 24 swarm algorithms together with their modifications and practical applications. Each chapter is devoted to one algorithm. It contains a short description along with a pseudo-code showing the various stages of its operation. In addition, each chapter contains a description of selected modifications of the algorithm and shows how it can be used to solve a selected practical problem.This book should also be useful for undergraduate and postgraduate students studying nature-based optimization algorithms, and can be a helpful tool for learning these algorithms, along with their modifications and practical applications. In addition, it can be a useful source of knowledge for scientists working in the field of artificial intelligence, as well as for engineers interested in using this type of algorithms in their work.If the reader wishes to expand his knowledge beyond the basics of swarm intelligence algorithms presented in this book and is interested in more detailed information, we recommend the book "Swarm Intelligence Algorithms: A Tutorial" (Edited by A. Slowik, CRC Press, 2020). It contains a detailed explanation of how each algorithm works, along with relevant program codes in Matlab and the C ++ programming language, as well as numerical examples illustrating step-by-step how individual algorithms work.
Software Architecture with C++
Apply business requirements to IT infrastructure and deliver a high-quality product by understanding architectures such as microservices, DevOps, and cloud-native using modern C++ standards and featuresKey Features: Design scalable large-scale applications with the C++ programming languageArchitect software solutions in a cloud-based environment with continuous integration and continuous delivery (CI/CD)Achieve architectural goals by leveraging design patterns, language features, and useful toolsBook Description: Software architecture refers to the high-level design of complex applications. It is evolving just like the languages we use. Modern C++ allows developers to write high-performance apps in a high-level language without sacrificing readability and maintainability. If you're working with modern C++, this practical guide will help you put your knowledge to work and design distributed, large-scale apps. You'll start by getting up to speed with architectural concepts, including established patterns and rising trends. The book will then explain what software architecture is and help you explore its components. Next, you'll discover the design concepts involved in application architecture and the patterns in software development, before going on to learn how to build, package, integrate, and deploy your components. In the concluding chapters, you'll explore different architectural qualities, such as maintainability, reusability, testability, performance, scalability, and security. Finally, you will get an overview of distributed systems, such as service-oriented architecture, microservices, and cloud-native, and understand how to apply them in application development.By the end of this book, you'll be able to build distributed services using modern C++ and associated tools to deliver solutions as per your clients' requirements.What You Will Learn: Understand how to apply the principles of software architectureApply design patterns and best practices to meet your architectural goalsWrite elegant, safe, and performant code using the latest C++ featuresBuild applications that are easy to maintain and deployExplore the different architectural approaches and learn to apply them as per your requirementSimplify development and operations using application containersDiscover various techniques to solve common problems in software design and developmentWho this book is for: This software architecture C++ programming book is for experienced C++ developers who are looking to become software architects or are interested in developing enterprise-grade applications.
Soft Computing and Its Applications, Volume I
This is volume 1 of the two-volume set Soft Computing and Its Applications. This volume explains the primary tools of soft computing as well as provides an abundance of working examples and detailed design studies. The book starts with coverage of fuzzy sets and fuzzy logic and their various approaches to fuzzy reasoning. Precisely speaking, this book provides a platform for handling different kinds of uncertainties of real-life problems. It introduces the reader to the topic of rough sets. This book's companion volume, Volume 2: Fuzzy Reasoning and Fuzzy Control, will move forward from here to discuss several advanced features of soft computing and application methodologies. This new book: - Discusses the present state of art of soft computing-Includes the existing application areas of soft computing- Presents original research contributions- Discusses the future scope of work in soft computingThe book is unique in that it bridges the gap between theory and practice, and it presents several experimental results on synthetic data and real-life data. The book provides a unified platform for applied scientists and engineers in different fields and industries for the application of soft computing tools in many diverse domains of engineering.