Große Auswahl an günstigen Büchern
Schnelle Lieferung per Post und DHL

Bücher der Reihe SpringerBriefs in Computer Science

Filter
Filter
Ordnen nachSortieren Reihenfolge der Serie
  • von Liang Wang
    44,00 €

    Although deep learning models have achieved great progress in vision, speech, language, planning, control, and many other areas, there still exists a large performance gap between deep learning models and the human cognitive system. Many researchers argue that one of the major reasons accounting for the performance gap is that deep learning models and the human cognitive system process visual information in very different ways.To mimic the performance gap, since 2014, there has been a trend to model various cognitive mechanisms from cognitive neuroscience, e.g., attention, memory, reasoning, and decision, based on deep learning models. This book unifies these new kinds of deep learning models and calls them deep cognitive networks, which model various human cognitive mechanisms based on deep learning models. As a result, various cognitive functions are implemented, e.g., selective extraction, knowledge reuse, and problem solving, for more effective information processing.This book first summarizes existing evidence of human cognitive mechanism modeling from cognitive psychology and proposes a general framework of deep cognitive networks that jointly considers multiple cognitive mechanisms. Then, it analyzes related works and focuses primarily but not exclusively, on the taxonomy of four key cognitive mechanisms (i.e., attention, memory, reasoning, and decision) surrounding deep cognitive networks. Finally, this book studies two representative cases of applying deep cognitive networks to the task of image-text matching and discusses important future directions.

  • von Shuliang Wang, Jianfeng Xu, Zhenyu Liu, usw.
    30,00 €

    Objective Information Theory (OIT) is proposed to represent and compute the information in a large-scale complex information system with big data in this monograph. To formally analyze, design, develop, and evaluate the information, OIT interprets the information from essential nature, measures the information from mathematical properties, and models the information from concept, logic, and physic. As the exemplified applications, Air Traffic Control System (ATCS) and Smart Court SoSs (System of Systems) are introduced for practical OITs. This Open Access book can be used as a technical reference book in the field of information science and also a reference textbook for senior students and graduate ones in related majors.

  • von Dietmar Dietrich
    49,00 €

    To be able to merge the psyche with the neural system has been a long-sought goal. There is much scientific literature on results from research on this topic, but the goal of this ¿booklet¿ is to present the subject in a nutshell and to attract a wider audience to this highly complex topic. Scientists often need years to grasp the scope and implications of merging the psyche with the neural system. Does that really have to be the case? What does the simulated model look like? What are the underlying philosophies? Can it be understood without mathematical formalism?Uniting the psyche and neurology in one model, on the one hand, allows psychological and social theories to be tested on a scientific basis using simulation experiments. On the other hand, a model developed according to the functional structures of the human brain, let us call it the Psi-Organ, which comprises neurology and psyche as one unit, can serve as a basis for AI systems. These can be systems with cognitive capabilities that save human lives, save energy, ensure safety at airports, provide support in caring for the elderly and much more. In other words, systems that can simplify our lives in the most relevant ways and on a broad basis. This model, the Psi-Organ, goes far beyond today's primarily behavior-based AI methods.The manuscript can serve as an excellent introduction to the problem of understanding and modelling the human mind, and to the problem of achieving artificial ¿intelligence¿ in general, increasing awareness and understanding for the associated challenges. In that regard, it is a valuable supplementary text for advanced students or researchers in the field, notably not only in AI, but also (and perhaps primarily) in the medical fields.

  • von Kaishun Wu
    49,00 €

    This book introduces readers to the fundamentals of the cross-technology coexistence problem in heterogeneous wireless networks. It also highlights a range of mechanisms designed to combat this problem and improve network performance, including protocol design, theoretical analysis, and experimental evaluation.In turn, the book proposes three mechanisms that can be combined to combat the cross-technology coexistence problem and improve network performance. First, the authors present a fast signal identification method. It provides the basis for the subsequent protocol design and allows heterogeneous devices to adopt proper transmission strategies. Second, the authors present two cross-technology interference management mechanisms in both the time domain and the frequency domain, which can mitigate interference and increase transmission opportunities for heterogeneous devices, thus improving network performance. Third, they present a cross-technology communication mechanism basedon symbol-level energy modulation, which allows heterogeneous devices to transmit information directly without a gateway, improving transmission efficiency and paving the way for new applications in IoT scenarios. Lastly, they outline several potential research directions to further improve the efficiency of cross-technology coexistence. This book is intended for researchers, computer scientists, and engineers who are interested in the research areas of wireless networking, wireless communication, mobile computing, and Internet of Things. Advanced-level students studying these topics will benefit from the book as well.

  • von Quanyan Zhu
    49,00 €

    This book presents the latest research in cognitive security, a rapidly emerging field that addresses the vulnerabilities in human behavior and cognition that can lead to Cyber-Physical Systems (CPS) compromise. This book demonstrates that as adversaries increasingly use manipulative and deceptive information to disrupt human cognitive processes, including sensation, attention, memory, and mental operations, humans are misled into fallacious reasoning and manipulated decisions that can lead to system-level meltdown. Cognitive security aims to protect humans from the exploitation of cognitive vulnerabilities, help them make informed decisions that are free from manipulation and undue influence, and mitigate the aggravating risk in the ensuing steps of the attacker¿s kill chain. This book offers solutions that work across different fields, such as psychology, neuroscience, data science, social science, and game theory, to deal with cognitive threats. It guides the reader through the core ideas with figures, real-life examples, and case studies. Moreover, it formally defines all research questions, presents the results using mathematical theorems and proofs, and obtains insights through numerical validation. This book provides a self-contained and brief overview of essential system-scientific tools for modeling, analyzing, and mitigating cognitive vulnerabilities. The concepts of human cognitive capacities and cognitive vulnerabilities are formally discussed, followed by two case studies in the scenarios of reactive and proactive attention vulnerabilities. This book provides insights and applications on this transdisciplinary topic, with the goal of motivating future research in this emerging area and pushing the frontier of human-technology convergence. This book is a valuable reference for researchers and advanced-level students studying or working in cognitive security and related fields. It is also useful for decision-makers, managers, and professionals working within these related fields.

  • von Sanaa Kaddoura
    44,00 €

    This book is meant for readers who want to understand GANs without the need for a strong mathematical background. Moreover, it covers the practical applications of GANs, making it an excellent resource for beginners. A Primer on Generative Adversarial Networks is suitable for researchers, developers, students, and anyone who wishes to learn about GANs. It is assumed that the reader has a basic understanding of machine learning and neural networks. The book comes with ready-to-run scripts that readers can use for further research. Python is used as the primary programming language, so readers should be familiar with its basics.The book starts by providing an overview of GAN architecture, explaining the concept of generative models. It then introduces the most straightforward GAN architecture, which explains how GANs work and covers the concepts of generator and discriminator. The book then goes into the more advanced real-world applications of GANs, such as human face generation, deep fake, CycleGANs, and more.By the end of the book, readers will have an essential understanding of GANs and be able to write their own GAN code. They can apply this knowledge to their projects, regardless of whether they are beginners or experienced machine learning practitioners.

  • von Stan Matwin
    44,00 €

    This book provides a broad overview of the state of the art of the research in generative methods for the analysis of social media data. It especially includes two important aspects that currently gain importance in mining and modelling social media: dynamics and networks.The book is divided into five chapters and provides an extensive bibliography consisting of more than 250 papers. After a quick introduction and survey of the book in the first chapter, chapter 2 is devoted to the discussion of data models and ontologies for social network analysis. Next, chapter 3 deals with text generation and generative text models and the dangers they pose to social media and society at large. Chapter 4 then focuses on topic modelling and sentiment analysis in the context of social networks. Finally, Chapter 5 presents graph theory tools and approaches to mine and model social networks. Throughout the book, open problems, highlighting potential future directions, are clearly identified.The book aims at researchers and graduate students in social media analysis, information retrieval, and machine learning applications.

  • von Philippe Besnard & Thomas Guyet
    44,00 €

    This book is intended as an introduction to a versatile model for temporal data. It exhibits an original lattice structure on the space of chronicles and proposes new counting approach for multiple occurrences of chronicle occurrences. This book also proposes a new approach for frequent temporal pattern mining using pattern structures. This book was initiated by the work of Ch. Dousson in the 1990¿s. At that time, the prominent format was Temporal Constraint Networks for which the article by Richter, Meiri and Pearl is seminal.Chronicles do not conflict with temporal constraint networks, they are closely related. Not only do they share a similar graphical representation, they also have in common a notion of constraints in the timed succession of events. However, chronicles are definitely oriented towards fairly specific tasks in handling temporal data, by making explicit certain aspects of temporal data such as repetitions of an event. The notion of chronicle has been applied both for situation recognition and temporal sequence abstraction. The first challenge benefits from the simple but expressive formalism to specify temporal behavior to match in a temporal sequence. The second challenge aims to abstract a collection of sequences by chronicles with the objective to extract characteristic behaviors.This book targets researchers and students in computer science (from logic to data science). Engineers who would like to develop algorithms based on temporal models will also find this book useful.

  • von Showmik Bhowmik
    44,00 €

    Document layout analysis (DLA) is a crucial step towards the development of an effective document image processing system. In the early days of document image processing, DLA was not considered as a complete and complex research problem, rather just a pre-processing step having some minor challenges. The main reason for that is the type of layout being considered for processing was simple. Researchers started paying attention to this complex problem as they come across a large variety of documents. This book presents a clear view of the past, present, and future of DLA, and it also discusses two recent methods developed to address the said problem.

  • von Hua Xu
    44,00 €

    Natural interaction is one of the hottest research issues in human-computer interaction. At present, there is an urgent need for intelligent devices (service robots, virtual humans, etc.) to be able to understand intentions in an interactive dialogue. Focusing on human-computer understanding based on deep learning methods, the book systematically introduces readers to intention recognition, unknown intention detection, and new intention discovery in human-computer dialogue. This book is the first to present interactive dialogue intention analysis in the context of natural interaction. In addition to helping readers master the key technologies and concepts of human-machine dialogue intention analysis and catch up on the latest advances, it includes valuable references for further research.

  • von Xin Luo
    44,00 €

    This book mainly shows readers how to calibrate and control robots. In this regard, it proposes three control schemes: an error-summation enhanced Newton algorithm for model predictive control; RNN for solving perturbed time-varying underdetermined linear systems; and a new joint-drift-free scheme aided with projected ZNN, which can effectively improve robot control accuracy. Moreover, the book develops four advanced algorithms for robot calibration ¿ Levenberg-Marquarelt with diversified regularizations; improved covariance matrix adaptive evolution strategy; quadratic interpolated beetle antennae search algorithm; and a novel variable step-size Levenberg-Marquardt algorithm ¿ which can effectively enhance robot positioning accuracy.In addition, it is exceedingly difficult for experts in other fields to conduct robot arm calibration studies without calibration data. Thus, this book provides a publicly available dataset to assist researchers from other fields in conductingcalibration experiments and validating their ideas. The book also discusses six regularization schemes based on its robot error models, i.e., L1, L2, dropout, elastic, log, and swish. Robots¿ positioning accuracy is significantly improved after calibration. Using the control and calibration methods developed here, readers will be ready to conduct their own research and experiments.

  • von Jiadi Yu
    40,00 €

    As a privacy-preserving and illumination-robust manner, WiFi signal-based user authentication has become a new direction for ubiquitous user authentication to protect user privacy and security. It gradually turns into an important option for addressing the security concern of IoT environment.However, due to the limited sensing capability of WiFi signals and wide application scenarios, WiFi signal-based user authentication suffers from practical issues of diversified behaviors and complex scenarios.Therefore, it is necessary to address the issues and build integrated systems for user authentication using WiFi signals. In this book, the development and progress of WiFi signal-based user authentication systems in extensive scenarios are presented, which provides a new direction and solution for ubiquitous security and privacy protection. This book gives strong motivation of leveraging WiFi signals to sense human activities for user authentication, and presents the keyissues of WiFi-based user authentication in diversified behaviors and complex scenarios. This book provides the approaches for digging WiFi signals to sense human activities and extract features, realizing user authentication under fine-grained finger gestures, undefined body gestures, and multi-user scenarios. State-of-the-art researches and future directions involved with WiFi signal-based user authentication are presented and discussed as well. This book will benefit researchers and practitioners in the related field.

  • von William F. Clocksin
    44,00 €

    This SpringerBrief is a computational study of significant concerns and their role in forming long-term relationships between intelligent entities. Significant concerns include attitudes, preferences, affinities, and values that are held to be highly valued and meaningful: The means through which a person may find deeply held identity, purpose, and transformation. Significant concerns always engage the emotions and senses in a way that simply holding an opinion may or may not. For example, experiencing a significant concern may provoke deep feelings of awe and wonder in a way that deciding what to have for lunch probably does not, even if the lunch decision involves a rich array of preferences and values. Significant concerns also include what Emmons has called ultimate concerns.The author builds upon this base by considering the hypothetical case of intelligence in androids. An android is defined as a human-like robot that humans would accept as equal to humans in how theyperform and behave in society. An android as defined in this book is not considered to be imitating a human, nor is its purpose to deceive humans into believing that it is a human. Instead, the appropriately programmed android self-identifies as a non-human with its own integrity as a person. Therefore, a computational understanding of personhood and how persons ¿ whether human or android ¿ participate in relationships is essential to this perspective on artificial intelligence.Computational Modelling of Robot Personhood and Relationality describes in technical detail an implementation of a computational model called Affinity that takes the form of a simulation of a population of entities that form, maintain, and break relationships with each other depending upon a rich range of values, motivations, attitudes, and beliefs. Future experimentation and improvements of this model may be used not only to gain a wider understanding of human persons but may also form a preliminary cognitive model of the reasoning process of an android.

  • von Shu Wang
    44,00 €

    This book provides readers with the basic understanding regarding the threats to the voice processing systems, the state-of-the-art defense methods as well as the current research results on securing voice processing systems.It also introduces three mechanisms to secure the voice processing systems against malicious voice attacks under different scenarios, by utilizing time-domain signal waves, frequency-domain spectrum features, and acoustic physical attributes.First, the authors uncover the modulated replay attack, which uses an inverse filter to compensate for the spectrum distortion caused by the replay attacks to bypass the existing spectrum-based defenses. The authors also provide an effective defense method that utilizes both the time-domain artifacts and frequency-domain distortion to detect the modulated replay attacks. Second, the book introduces a secure automatic speech recognition system for driverless car to defeat adversarial voice command attacks launched from car loudspeakers, smartphones, and passengers. Third, it provides an acoustic compensation system design to reduce the effects from the spectrum reduction attacks, by the audio spectrum compensation and acoustic propagation principle. Finally, the authors conclude with their research effort on defeating the malicious voice attacks and provide insights into more secure voice processing systems.This book is intended for security researchers, computer scientists, and electrical engineers who are interested in the research areas of biometrics, speech signal processing, IoT security, and audio security. Advanced-level students who are studying these topics will benefit from this book as well.

  • von Nirvana Popescu
    44,00 €

    One of the main benefits of this book is that it presents a comprehensive and innovative eHealth framework that leverages deep learning and IoT wearable devices for the evaluation of Parkinson's disease patients. This framework offers a new way to assess and monitor patients' motor deficits in a personalized and automated way, improving the efficiency and accuracy of diagnosis and treatment.Compared to other books on eHealth and Parkinson's disease, this book offers a unique perspective and solution to the challenges facing patients and healthcare providers. It combines state-of-the-art technology, such as wearable devices and deep learning algorithms, with clinical expertise to develop a personalized and efficient evaluation framework for Parkinson's disease patients.This book provides a roadmap for the integration of cutting-edge technology into clinical practice, paving the way for more effective and patient-centered healthcare. To understand this book, readers should have a basic knowledge of eHealth, IoT, deep learning, and Parkinson's disease. However, the book provides clear explanations and examples to make the content accessible to a wider audience, including researchers, practitioners, and students interested in the intersection of technology and healthcare.

  • von Pedro Mejia Alvarez
    44,00 €

    This book provides an overview of both experimental and commercial real-time database systems (RTDBs) and a systematic approach to understanding, designing, and implementing them.To this end, the book is composed of four chapters: Chapter 1 ¿An Overview of Real-Time Database Systems¿ delves into the realm of RTDBs and discusses the specific requirements, transaction models, and scheduling algorithms that set RTDBs apart from conventional DBMs. Chapter 2 on ¿Experimental Real-Time Databases¿ presents various experimental RTDBs developed in academia with their architectures, features, and implementations, while chapter 3 on ¿Commercial Real-Time Databases¿ does so for systems developed and offered by commercial vendors as products or services. Eventually, chapter 4 on ¿Applications of Real-Time Database Systems¿ showcases various applications of RTDBs across different domains.This book will help researchers, graduate students and advanced professionals to get anoverview of the area and to understand the main challenges and systems available.

  • von Bin Duo
    44,00 €

    This book focuses on the model and algorithm aspects of securing Unmanned Aerial Vehicle Networks (UAV). To equip readers with the essential knowledge required for conducting research in this field, it covers the foundational concepts of this topic as well. This book also offers a detailed insight into UAV networks from the physical layer security point of view.The authors discuss the appropriate channel models for characterizing various propagation environments that UAV networks are exposed. The state-of-the-art technologies, such as UAV trajectory design, cooperative jamming and reconfigurable intelligent surfaces are covered. The corresponding algorithms for significantly improving the security of UAV networks, along with practical case studies on topics such as energy-efficient and secure UAV networks, elevation angle-distance trade-off for securing UAV networks and securing UAV networks with the aid of reconfigurable intelligent surfaces are presented as well. Last, this book outlines the future challenges and research directions to facilitate further studies on secure UAV networks. This book is suitable reading for graduate students and researchers who are interested in the research areas of UAV networking and communications, IoT security, and physical layer security in wireless networks. Professionals working within these related fields will also benefit from this book.

  • von Tianzheng Wang
    40,00 €

    This book focuses on online transaction processing indexes designed for scalable, byte-addressable non-volatile memory (NVM) and provides a systematic review and summary of the fundamental principles and techniques as well as an outlook on the future of this research area.In this book, the authors divide the development of NVM indexes into three ¿eras¿¿ pre-Optane, Optane and post-Optane¿based on when the first major scalable NVM device (Optane) became commercially available and when it was announced to be discontinued. The book will analyze the reasons for the slow adoption of NVM and give an outlook for indexing techniques in the post-Optane era.The book assumes only basic undergraduate-level understanding on indexing (e.g., B+-trees, hash tables) and database systems in general. It is otherwise self-contained with the necessary background information, including an introduction to NVM hardware and software/programming issues, a detailed description of different indexes in highly concurrent systems for non-experts and new researchers to get started in this area.

  • von Youqi Li
    44,00 €

    Mobile crowdsensing (MCS) is emerging as a novel sensing paradigm in the Internet of Things (IoTs) due to the proliferation of smart devices (e.g., smartphones, wearable devices) in people¿s daily lives. These ubiquitous devices provide an opportunity to harness the wisdom of crowds by recruiting mobile users to collectively perform sensing tasks, which largely collect data about a wide range of human activities and the surrounding environment. However, users suffer from resource consumption such as battery, processing power, and storage, which discourages users¿ participation. To ensure the participation rate, it is necessary to employ an incentive mechanism to compensate users¿ costs such that users are willing to take part in crowdsensing.This book sheds light on the design of incentive mechanisms for MCS in the context of game theory. Particularly, this book presents several game-theoretic models for MCS in different scenarios. In Chapter 1, the authors present an overview of MCS and state the significance of incentive mechanism for MCS. Then, in Chapter 2, 3, 4, and 5, the authors propose a long-term incentive mechanism, a fair incentive mechanism, a collaborative incentive mechanism, and a coopetition-aware incentive mechanism for MCS, respectively. Finally, Chapter 6 summarizes this book and point out the future directions.This book is of particular interest to the readers and researchers in the field of IoT research, especially in the interdisciplinary field of network economics and IoT.

  • von Max Smith-Creasey
    44,00 €

    This book offers an overview of the field of continuous biometric authentication systems, which capture and continuously authenticate biometrics from user devices. This book first covers the traditional methods of user authentication and discusses how such techniques have become cumbersome in the world of mobile devices and short usage sessions. The concept of continuous biometric authentication systems is introduced and their construction is discussed. The different biometrics that these systems may utilise (e.g.: touchscreen-gesture interactions) are described and relevant studies surveyed. It also surveys important considerations and challenges.This book brings together a wide variety of key motivations, components and advantages of continuous biometric authentication systems. The overview is kept high level, so as not to limit the scope to any single device, biometric trait, use-case, or scenario. Therefore, the contents of this book are applicable todevices ranging from smartphones to desktop computers, utilising biometrics ranging from face recognition to keystroke dynamics. It also provides metrics from a variety of existing systems such that users can identify the advantages and disadvantages of different approaches.This book targets researchers and lecturers working in authentication, as well as advanced-level students in computer science interested in this field. The book will also be of interest to technical professionals working in cyber security.

  • von Romano Fantacci
    44,00 €

    This book provides a comprehensive and systematic exploration of next-generation Edge Intelligence (EI) Networks. It delves deep into the critical design considerations within this context, emphasizing the necessity for functional and dependable interactions between networking strategies and the diverse application scenarios. This should help assist to encompass a wide range of environments.This book also discusses topics such as resource optimization, incentive mechanisms, channel prediction and cutting-edge technologies, which includes digital twins and advanced machine learning techniques. It underscores the importance of functional integration to facilitate meaningful collaborations between networks and systems, while operating across heterogeneous environments aiming support novel and disruptive human-oriented services and applications. Valuable insights into the stringent requirements for intelligence capabilities, communication latency and real-time response are discussed. This characterizes the new EI era, driving the creation of comprehensive cross-domain architectural ecosystems that infuse human-like intelligence into every aspect of emerging EI systems.This book primarily targets advanced-level students as well as postdoctoral researchers, who are new to this field and are searching for a comprehensive understanding of emerging EI systems. Practitioners seeking guidance in the development and implementation of EI systems in practical contexts will also benefit from this book.

  • von Pedro Mejia Alvarez
    44,00 €

    This book presents the fundamentals of exception handling with examples written in C++ and Python. Starting with its history and evolution, it explores the many facets of exception handling, such as its syntax, semantics, challenges, best practices, and implementation patterns.The book is composed of five chapters: Chapter 1 provides an introduction, covering the history, various definitions, and challenges of exception handling. Chapter 2 then delves into the basics, offering insights into the foundational concepts and techniques. Subsequently, chapter 3 touches upon the best practices for exception handling, including the differences between errors and exceptions, the use of assertions, and how to provide meaningful error messages. Chapter 4 takes a deep dive into advanced exception-handling techniques, exploring e.g. patterns, guard clauses, and hierarchical exception handling. Eventually, chapter 5 focuses on the complexities of exception handling in real-time and embedded systems.This book is mainly written for both students and professionals. Its readers will understand the nuances between syntax and semantic errors, learn how to employ try-catch blocks effectively, grasp the importance of logging exceptions, and delve into advanced exception-handling techniques. This way, they will be enabled to handle exceptions effectively and thus write more robust, reliable, and resilient code.

Willkommen bei den Tales Buchfreunden und -freundinnen

Jetzt zum Newsletter anmelden und tolle Angebote und Anregungen für Ihre nächste Lektüre erhalten.