You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This open access book brings together the latest developments from industry and research on automated driving and artificial intelligence. Environment perception for highly automated driving heavily employs deep neural networks, facing many challenges. How much data do we need for training and testing? How to use synthetic data to save labeling costs for training? How do we increase robustness and decrease memory usage? For inevitably poor conditions: How do we know that the network is uncertain about its decisions? Can we understand a bit more about what actually happens inside neural networks? This leads to a very practical problem particularly for DNNs employed in automated driving: What ...
In this prequel to the urban fantasy novel Lies and Prophecy, Kim is ready for her freshman year at college—but her challenges include more than just choosing courses and learning to live with a roommate. Welton University has welcomed a new student, one of the strange and powerful wilders. If Julian Fiain is going to fit in among his fellow psychics, he’s going to need friends.
The Lloyd’s Register of Yachts was first issued in 1878, and was issued annually until 1980, except during the years 1916-18 and 1940-46. Two supplements containing additions and corrections were also issued annually. The Register contains the names, details and characters of Yachts classed by the Society, together with the particulars of other Yachts which are considered to be of interest, illustrates plates of the Flags of Yacht and Sailing Clubs, together with a List of Club Officers, an illustrated List of the Distinguishing Flags of Yachtsmen, a List of the Names and Addresses of Yacht Owners, and much other information. For more information on the Lloyd’s Register of Yachts, please click here: https://hec.lrfoundation.org.uk/archive-library/lloyds-register-of-yachts-online
The Lloyd’s Register of Yachts was first issued in 1878, and was issued annually until 1980, except during the years 1916-18 and 1940-46. Two supplements containing additions and corrections were also issued annually. The Register contains the names, details and characters of Yachts classed by the Society, together with the particulars of other Yachts which are considered to be of interest, illustrates plates of the Flags of Yacht and Sailing Clubs, together with a List of Club Officers, an illustrated List of the Distinguishing Flags of Yachtsmen, a List of the Names and Addresses of Yacht Owners, and much other information. For more information on the Lloyd’s Register of Yachts, please click here: https://hec.lrfoundation.org.uk/archive-library/lloyds-register-of-yachts-online
This book presents the proceedings of the International Computer Symposium 2014 (ICS 2014), held at Tunghai University, Taichung, Taiwan in December. ICS is a biennial symposium founded in 1973 and offers a platform for researchers, educators and professionals to exchange their discoveries and practices, to share research experiences and to discuss potential new trends in the ICT industry. Topics covered in the ICS 2014 workshops include: algorithms and computation theory; artificial intelligence and fuzzy systems; computer architecture, embedded systems, SoC and VLSI/EDA; cryptography and information security; databases, data mining, big data and information retrieval; mobile computing, wireless communications and vehicular technologies; software engineering and programming languages; healthcare and bioinformatics, among others. There was also a workshop on information technology innovation, industrial application and the Internet of Things. ICS is one of Taiwan's most prestigious international IT symposiums, and this book will be of interest to all those involved in the world of information technology.
This book presents the latest developments in biometrics technologies and reports on new approaches, methods, findings, and technologies developed or being developed by the research community and the industry. The book focuses on introducing fundamental principles and concepts of key enabling technologies for biometric systems applied for both physical and cyber security. The authors disseminate recent research and developing efforts in this area, investigate related trends and challenges, and present case studies and examples such as fingerprint, face, iris, retina, keystroke dynamics, and voice applications . The authors also investigate the advances and future outcomes in research and development in biometric security systems. The book is applicable to students, instructors, researchers, industry practitioners, and related government agencies staff. Each chapter is accompanied by a set of PowerPoint slides for use by instructors.
Todays businesses face the pressing challenge of how to effectively engage and build lasting relationships with customers in an increasingly crowded and competitive online space. Traditional marketing tactics are no longer sufficient to capture the attention and loyalty of modern consumers who demand personalized experiences and sustainable practices from the brands they support. This shifting paradigm necessitates innovative solutions that leverage cutting-edge technologies to enhance customer engagement and foster meaningful connections. Leveraging AI for Effective Digital Relationship Marketing addresses this critical dilemma by exploring the transformative potential of artificial intel...
This book contains extended version of selected works that have been discussed and presented in the fourth International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2017) held in Patna, India during March 17-19, 2017. The symposium was organized by the Departments of Computer Science & Engineering and A. K. Choudhury School of Information Technology, both from University of Calcutta in collaboration with NIT, Patna. The International partners for ACSS 2016 had been Ca Foscari University of Venice, Italy and Bialystok University of Technology, Poland. This bi-volume book has a total of 21 papers divided in 7 chapters. The chapters reflect the sessions in which the works have been discussed during the symposium. The different chapters in the book include works on biometrics, image processing, pattern recognition, algorithms, cloud computing, wireless sensor networks and security systems.
This book gathers high-quality papers presented at the First International Conference on Sustainable Technologies for Computational Intelligence (ICTSCI 2019), which was organized by Sri Balaji College of Engineering and Technology, Jaipur, Rajasthan, India, on March 29–30, 2019. It covers emerging topics in computational intelligence and effective strategies for its implementation in engineering applications.
In the modern world, natural disasters are becoming more commonplace, unmanned systems are becoming the norm, and terrorism and espionage are increasingly taking place online. All of these threats have made it necessary for governments and organizations to steel themselves against these threats in innovative ways. Developing Next-Generation Countermeasures for Homeland Security Threat Prevention provides relevant theoretical frameworks and empirical research outlining potential threats while exploring their appropriate countermeasures. This relevant publication takes a broad perspective, from network security, surveillance, reconnaissance, and physical security, all topics are considered with equal weight. Ideal for policy makers, IT professionals, engineers, NGO operators, and graduate students, this book provides an in-depth look into the threats facing modern society and the methods to avoid them.