Search Constraints
Number of results to display per page
Results for:
Search Results
-
Others
Geospatial artificial intelligence sometimes referred to as geoAI is recently receiving so much attention. From large-scale projects to smaller projects. GeoAI can be referred to as using artificial intelligence with Geographical information system to analyse and produce solution-based predictions.
- Subjects:
- Land Surveying and Geo-Informatics and Computing, Data Science and Artificial Intelligence
- Keywords:
- Geospatial data Geographic information systems Artificial intelligence
- Resource Type:
- Others
-
Others
Software developments is advancing the technological world today. This changes have far more reaching implications in I.T industries such as Big data, Artificial intelligence and Agile Software development methodologies. Competition in the software development ecosystem has made developers to build software that are quick and reliable and often referred to as Agile development. Agile transformation is real and requires rethinking the business management, recruitment process and data strategy in a bid to stimulate disruptive solutions from within in-house development and deployment. AI product development would require rapid transformational changes within any organization. This can be accomplished by establishing specific operating models that permit development teams with the freedom of technology choice. This publication highlights some operating models that can be adopted to improve the success of AI products using Agile software development methodologies.
- Subjects:
- Computing, Data Science and Artificial Intelligence
- Keywords:
- Agile software development
- Resource Type:
- Others
-
Courseware
This course provides a broad introduction to machine learning and statistical pattern recognition. The course will also discuss recent applications of machine learning, such as to robotic control, data mining, autonomous navigation, bioinformatics, speech recognition, and text and web data processing. Topics include: supervised learning (generative/discriminative learning, parametric/non-parametric learning, neural networks, support vector machines); unsupervised learning (clustering, dimensionality reduction, kernel methods); learning theory (bias/variance tradeoffs; VC theory; large margins); reinforcement learning and adaptive control.
- Subjects:
- Computing, Data Science and Artificial Intelligence
- Keywords:
- Pattern perception -- Statistical methods Machine learning
- Resource Type:
- Courseware
-
Courseware
This course examines human-computer interaction in the context of graphical user interfaces. The course covers human capabilities, design principles, prototyping techniques, evaluation techniques, and the implementation of graphical user interfaces. Deliverables include short programming assignments and a semester-long group project. Students taking the graduate version also have readings from current literature and additional assignments.
- Subjects:
- Computing, Data Science and Artificial Intelligence
- Keywords:
- User interfaces (Computer systems) Human-computer interaction
- Resource Type:
- Courseware
-
Courseware
This is an intermediate algorithms course with an emphasis on teaching techniques for the design and analysis of efficient algorithms, emphasizing methods of application. Topics include divide-and-conquer, randomization, dynamic programming, greedy algorithms, incremental improvement, complexity, and cryptography.
- Subjects:
- Computing, Data Science and Artificial Intelligence
- Keywords:
- Algorithms
- Resource Type:
- Courseware
-
Courseware
This course includes interactive demonstrations which are intended to stimulate interest and to help students gain intuition about how artificial intelligence methods work under a variety of circumstances.
- Subjects:
- Computing, Data Science and Artificial Intelligence
- Keywords:
- Artificial intelligence
- Resource Type:
- Courseware
-
Courseware
6.858 Computer Systems Security is a class about the design and implementation of secure computer systems. Lectures cover threat models, attacks that compromise security, and techniques for achieving security, based on recent research papers. Topics include operating system (OS) security, capabilities, information flow control, language security, network protocols, hardware security, and security in web applications.
-
e-book
In the era of Internet of Things (IoT) and with the explosive worldwide growth of electronic data volume, and associated need of processing, analysis, and storage of such humongous volume of data, several new challenges are faced in protecting privacy of sensitive data and securing systems by designing novel schemes for secure authentication, integrity protection, encryption, and non-repudiation. Lightweight symmetric key cryptography and adaptive network security algorithms are in demand for mitigating these challenges. This book presents some of the state-of-the-art research work in the field of cryptography and security in computing and communications. It is a valuable source of knowledge for researchers, engineers, practitioners, graduates, and doctoral students who are working in the field of cryptography, network security, and security and privacy issues in the Internet of Things (IoT). It will also be useful for faculty members of graduate schools and universities.
-
e-book
Pattern recognition has gained significant attention due to the rapid explosion of internet- and mobile-based applications. Among the various pattern recognition applications, face recognition is always being the center of attraction. With so much of unlabeled face images being captured and made available on internet (particularly on social media), conventional supervised means of classifying face images become challenging. This clearly warrants for semi-supervised classification and subspace projection. Another important concern in face recognition system is the proper and stringent evaluation of its capability. This book is edited keeping all these factors in mind. This book is composed of five chapters covering introduction, overview, semi-supervised classification, subspace projection, and evaluation techniques.
- Subjects:
- Computing, Data Science and Artificial Intelligence and Electronic and Information Engineering
- Keywords:
- Human face recognition (Computer science)
- Resource Type:
- e-book
-
e-book
Advances and Applications in Mobile Computing offers guidelines on how mobile software services can be used in order to simplify the mobile users' life. The main contribution of this book is enhancing mobile software application development stages as analysis, design, development and test. Also, recent mobile network technologies such as algorithms, decreasing energy consumption in mobile network, and fault tolerance in distributed mobile computing are the main concern of the first section. In the mobile software life cycle section, the chapter on human computer interaction discusses mobile device handset design strategies, following the chapters on mobile application testing strategies. The last section, mobile applications as service, covers different mobile solutions and different application sectors.
- Subjects:
- Computing, Data Science and Artificial Intelligence
- Keywords:
- Mobile computing
- Resource Type:
- e-book