Listing 1 - 9 of 9 |
Sort by
|
Choose an application
Written to bridge the information needs of management and computational scientists, this book presents the first comprehensive treatment of Computational Red Teaming (CRT). The author describes an analytics environment that blends human reasoning and computational modeling to design risk-aware and evidence-based smart decision making systems. He presents the Shadow CRT Machine, which shadows the operations of an actual system to think with decision makers, challenge threats, and design remedies. This is the first book to generalize red teaming (RT) outside the military and security domains and it offers coverage of RT principles, practical and ethical guidelines. The author utilizes Gilbert’s principles for introducing a science. Simplicity: where the book follows a special style to make it accessible to a wide range of readers. Coherence: where only necessary elements from experimentation, optimization, simulation, data mining, big data, cognitive information processing, and system thinking are blended together systematically to present CRT as the science of Risk Analytics and Challenge Analytics. Utility: where the author draws on a wide range of examples, ranging from job interviews to Cyber operations, before presenting three case studies from air traffic control technologies, human behavior, and complex socio-technical systems involving real-time mining and integration of human brain data in the decision making environment. • Presents first comprehensive treatment of Computational Red Teaming; • Provides balanced coverage of the topic from the perspectives of risk thinking and computational modeling; • Includes thorough coverage of the computational approach to the problem; • Links risk analytics and challenge analytics with the right set of computational tools to assess risk in complex, “big-data” situations.
Electrical engineering --- Applied physical engineering --- Mass communications --- Information systems --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- gegevensopslag --- neuronale netwerken --- fuzzy logic --- cybernetica --- informatica --- KI (kunstmatige intelligentie) --- elektrotechniek --- communicatietechnologie
Choose an application
Discrete mathematics --- Mathematical statistics --- Molecular biology --- Computer science --- Programming --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- patroonherkenning --- factoranalyse --- discrete wiskunde --- informatica --- robots --- moleculaire biologie
Choose an application
This book draws inspiration from natural shepherding, whereby a farmer utilizes sheepdogs to herd sheep, to inspire a scalable and inherently human friendly approach to swarm control. The book discusses advanced artificial intelligence (AI) approaches needed to design smart robotic shepherding agents capable of controlling biological swarms or robotic swarms of unmanned vehicles. These smart shepherding agents are described with the techniques applicable to the control of Unmanned X Vehicles (UxVs) including air (unmanned aerial vehicles or UAVs), ground (unmanned ground vehicles or UGVs), underwater (unmanned underwater vehicles or UUVs), and on the surface of water (unmanned surface vehicles or USVs). This book proposes how smart 'shepherds' could be designed and used to guide a swarm of UxVs to achieve a goal while ameliorating typical communication bandwidth issues that arise in the control of multi agent systems. The book covers a wide range of topics ranging from the design of deep reinforcement learning models for shepherding a swarm, transparency in swarm guidance, and ontology-guided learning, to the design of smart swarm guidance methods for shepherding with UGVs and UAVs. The book extends the discussion to human-swarm teaming by looking into the real-time analysis of human data during human-swarm interaction, the concept of trust for human-swarm teaming, and the design of activity recognition systems for shepherding. Presents a comprehensive look at human-swarm teaming; Tackles artificial intelligence techniques for swarm guidance; Provides artificial intelligence techniques for real-time human performance analysis.
Telecommunication technology --- Electrical engineering --- Engineering sciences. Technology --- Transport. Traffic --- Mass communications --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- mechatronica --- industriële robots --- automatisering --- verkeer --- tekstverwerking --- transport --- algoritmen --- KI (kunstmatige intelligentie) --- robots --- communicatietechnologie --- automatische regeltechniek
Choose an application
This book explains how dual phase evolution operates in all these settings and provides a detailed treatment of the subject. The authors discuss the theoretical foundations for the theory, how it relates to other phase transition phenomena and its advantages in evolutionary computation and complex adaptive systems. The book provides methods and techniques to use this concept for problem solving. Dual phase evolution concerns systems that evolve via repeated phase shifts in the connectivity of their elements. It occurs in vast range of settings, including natural systems (species evolution, landscape ecology, geomorphology), socio-economic systems (social networks) and in artificial systems (annealing, evolutionary computing).
Mathematics --- Physics --- Applied physical engineering --- Engineering sciences. Technology --- Computer science --- Computer architecture. Operating systems --- analyse (wiskunde) --- economie --- informatica --- computerbesturingssystemen --- wiskunde --- OS (operating system) --- ingenieurswetenschappen --- fysica --- computernetwerken
Choose an application
This volume is an initiative undertaken by the IEEE Computational Intelligence Society’s Task Force on Security, Surveillance and Defense to consolidate and disseminate the role of CI techniques in the design, development and deployment of security and defense solutions. Applications range from the detection of buried explosive hazards in a battlefield to the control of unmanned underwater vehicles, the delivery of superior video analytics for protecting critical infrastructures or the development of stronger intrusion detection systems and the design of military surveillance networks. Defense scientists, industry experts, academicians and practitioners alike will all benefit from the wide spectrum of successful applications compiled in this volume. Senior undergraduate or graduate students may also discover uncharted territory for their own research endeavors.
Choose an application
This book introduces the linkage between evolutionary computation and complex networks and the advantages of cross-fertilising ideas from both fields. Instead of introducing each field individually, the authors focus on the research that sits at the interface of both fields. The book is structured to address two questions: (1) how complex networks are used to analyze and improve the performance of evolutionary computation methods? (2) how evolutionary computation methods are used to solve problems in complex networks? The authors interweave complex networks and evolutionary computing, using evolutionary computation to discover community structure, while also using network analysis techniques to analyze the performance of evolutionary algorithms.The book is suitable for both beginners and senior researchers in the fields of evolutionary computation and complex networks. Brings together the fields of evolutionary computation and complex networks, discussing them both qualitatively and quantitatively; Provides novel and efficient computational problem solving techniques that require little computer memory; Provides the pseudo-codes for the computational methods used in the book to enable readers to adopt the codes to their own problems.
Complex analysis --- Telecommunication technology --- Mass communications --- Computer science --- Computer architecture. Operating systems --- Computer. Automation --- complexe analyse (wiskunde) --- bedrijfssoftware --- computers --- tekstverwerking --- computerkunde --- communicatietechnologie
Choose an application
Choose an application
Offering a concise and multidisciplinary reference guide to the state of the art in Australian operations research, this book will be of great value to academics working in many disciplines associated with operations research, as well as industrial practitioners engaged in planning, scheduling and logistics. Over 60 papers, with topics ranging from academic research techniques and case studies to industrial and administrative best practices in operations research, address aspects such as: • optimization, combinatorial optimization, decision analysis, supply-chain management, queuing and routing, and project management; and • logistics, government, cyber security, health-care systems, mining and material processing, ergonomics and human factors, space applications, telecommunications and transportation, among many others. This book presents the Proceedings of the National Conference of the Australian Society for Operations Research, the premier professional organization for Australian academics and practitioners working in optimization and other disciplines related to operations research. The conference was held in Canberra in November 2016.
Industrial economics --- Operational research. Game theory --- Mathematical statistics --- Applied physical engineering --- Planning (firm) --- mathematische modellen --- speltheorie --- econometrie --- operationeel onderzoek --- industriële marketing --- ingenieurswetenschappen
Choose an application
Social sciences (general) --- Discrete mathematics --- Computer science --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- discrete wiskunde --- vormgeving --- informatica --- sociale wetenschappen --- simulaties --- robots
Listing 1 - 9 of 9 |
Sort by
|