Narrow your search

Library

KU Leuven (22)

Odisee (22)

Thomas More Kempen (22)

Thomas More Mechelen (22)

UCLL (22)

VIVES (22)

UGent (21)

ULB (20)

ULiège (19)

KBC (7)

More...

Resource type

book (23)

digital (1)


Language

English (23)


Year
From To Submit

2018 (23)

Listing 1 - 10 of 23 << page
of 3
>>
Sort by

Book
Adversarial Machine Learning
Authors: ---
ISBN: 3031015800 3031000250 3031004523 Year: 2018 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The increasing abundance of large high-quality datasets, combined with significant technical advances over the last several decades have made machine learning into a major tool employed across a broad array of tasks including vision, language, finance, and security. However, success has been accompanied with important new challenges: many applications of machine learning are adversarial in nature. Some are adversarial because they are safety critical, such as autonomous driving. An adversary in these applications can be a malicious party aimed at causing congestion or accidents, or may even model unusual situations that expose vulnerabilities in the prediction engine. Other applications are adversarial because their task and/or the data they use are. For example, an important class of problems in security involves detection, such as malware, spam, and intrusion detection. The use of machine learning for detecting malicious entities creates an incentive among adversaries to evade detection by changing their behavior or the content of malicius objects they develop. The field of adversarial machine learning has emerged to study vulnerabilities of machine learning approaches in adversarial settings and to develop techniques to make learning robust to adversarial manipulation. This book provides a technical overview of this field. After reviewing machine learning concepts and approaches, as well as common use cases of these in adversarial settings, we present a general categorization of attacks on machine learning. We then address two major categories of attacks and associated defenses: decision-time attacks, in which an adversary changes the nature of instances seen by a learned model at the time of prediction in order to cause errors, and poisoning or training time attacks, in which the actual training dataset is maliciously modified. In our final chapter devoted to technical content, we discuss recent techniques for attacks on deep learning, as well as approaches for improving robustness of deep neural networks. We conclude with a discussion of several important issues in the area of adversarial learning that in our view warrant further research. Given the increasing interest in the area of adversarial machine learning, we hope this book provides readers with the tools necessary to successfully engage in research and practice of machine learning in adversarial settings.


Multi
Practical Quantum Computing for Developers : Programming Quantum Rigs in the Cloud using Python, Quantum Assembly Language and IBM QExperience
Author:
ISBN: 9781484242186 1484242181 Year: 2018 Publisher: Berkeley, CA : Apress : Imprint: Apress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Write algorithms and program in the new field of quantum computing. This book covers major topics such as the physical components of a quantum computer: qubits, entanglement, logic gates, circuits, and how they differ from a traditional computer. Also, Practical Quantum Computing for Developers discusses quantum computing in the cloud using IBM Q Experience including: the composer, quantum scores, experiments, circuits, simulators, real quantum devices, and more. You’ll be able to run experiments in the cloud on a real quantum device. Furthermore, this book shows you how to do quantum programming using the QISKit (Quantum Information Software Kit), Python SDK, and other APIs such as QASM (Quantum Assembly). You’ll learn to write code using these languages and execute it against simulators (local or remote) or a real quantum computer provided by IBM’s Q Experience. Finally, you’ll learn the current quantum algorithms for entanglement, random number generation, linear search, integer factorization, and others. You’ll peak inside the inner workings of the Bell states for entanglement, Grover’s algorithm for linear search, Shor’s algorithm for integer factorization, and other algorithms in the fields of optimization, and more. Along the way you’ll also cover game theory with the Magic Square, an example of quantum pseudo-telepathy where parties sharing entangled states can be observed to have some kind of communication between them. In this game Alice and Bob play against a referee. Quantum mechanics allows Alice and Bob to always win! By the end of this book, you will understand how this emerging technology provides massive parallelism and significant computational speedups over classical computers, and will be prepared to program quantum computers which are expected to replace traditional computers in the data center. You will: Use the Q Experience Composer, the first-of-its-kind web console to create visual programs/experiments and submit them to a quantum simulator or real device on the cloud Run programs remotely using the Q Experience REST API Write algorithms that provide superior performance over their classical counterparts Build a Node.js REST client for authenticating, listing remote devices, querying information about quantum processors, and listing or running experiments remotely in the cloud Create a quantum number generator: The quintessential coin flip with a quantum twist Discover quantum teleportation: This algorithm demonstrates how the exact state of a qubit (quantum information) can be transmitted from one location to another, with the help of classical communication and quantum entanglement between the sender and receiver Peek into single qubit operations with the classic game of Battleships with a quantum twist Handle the counterfeit coin problem: a classic puzzle that consists of finding a counterfeit coin in a beam balance among eight coins in only two turns.


Book
Entrepreneurial Cognition : Exploring the Mindset of Entrepreneurs
Authors: ---
ISBN: 3319717820 3319717812 Year: 2018 Publisher: Springer Nature

Loading...
Export citation

Choose an application

Bookmark

Abstract

This open access book investigates the inter-relationship between the mind and a potential opportunity to explore the psychology of entrepreneurship. Building on recent research, this book offers a broad scope investigation of the different aspects of what goes on in the mind of the (potential) entrepreneur as he or she considers the pursuit of a potential opportunity, the creation of a new organization, and/or the selection of an entrepreneurial career. This book focuses on individuals as the level of analysis and explores the impact of the organization and the environment only inasmuch as they impact the individual’s cognitions. Readers will learn why some individuals and managers are able to able to identify and successfully act upon opportunities in uncertain environments while others are not. This book applies a cognitive lens to understand individuals’ knowledge, motivation, attention, identity, and emotions in the entrepreneurial process. .


Book
Mathematical Immunology of Virus Infections
Authors: --- --- ---
ISBN: 3319723170 3319723162 Year: 2018 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This monograph concisely but thoroughly introduces the reader to the field of mathematical immunology. The book covers first basic principles of formulating a mathematical model, and an outline on data-driven parameter estimation and model selection. The authors then introduce the modeling of experimental and human infections and provide the reader with helpful exercises. The target audience primarily comprises researchers and graduate students in the field of mathematical biology who wish to be concisely introduced into mathematical immunology. .


Book
Ahmes’ Legacy : Puzzles and the Mathematical Mind
Author:
ISBN: 3319932535 3319932543 Year: 2018 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book looks at classic puzzles from the perspective of their structures and what they tell us about the brain. It uses the work on the neuroscience of mathematics from Dehaene, Butterworth, Lakoff, Núñez, and many others as a lens to understand the ways in which puzzles reflect imaginative processes blended with rational ones. The book is not about recreational or puzzle-based mathematics in and of itself but rather about what the classic puzzles tell us about the mathematical imagination and its impact on the discipline. It delves into the history of classic math puzzles, deconstructing their raison d’être and describing their psychological features, so that their nature can be fleshed out in order to help understand the mathematical mind. This volume is the first monographic treatment of the psychological nature of puzzles in mathematics. With its user-friendly technical level of discussion, it is of interest to both general readers and those who engage in the disciplines of mathematics, psychology, neuroscience, and/or anthropology. It is also ideal as a textbook source for courses in recreational mathematics, or as reference material in introductory college math courses. .


Book
Computational Aspects and Applications in Large-Scale Networks : NET 2017, Nizhny Novgorod, Russia, June 2017
Authors: --- --- ---
ISBN: 3319962469 3319962477 Year: 2018 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Contributions in this volume focus on computationally efficient algorithms and rigorous mathematical theories for analyzing large-scale networks. Researchers and students in mathematics, economics, statistics, computer science and engineering will find this collection a valuable resource filled with the latest research in network analysis. Computational aspects and applications of large-scale networks in market models, neural networks, social networks, power transmission grids, maximum clique problem, telecommunication networks, and complexity graphs are included with new tools for efficient network analysis of large-scale networks. This proceeding is a result of the 7th International Conference in Network Analysis, held at the Higher School of Economics, Nizhny Novgorod in June 2017. The conference brought together scientists, engineers, and researchers from academia, industry, and government.


Book
Evolution of Primate Social Cognition
Authors: --- ---
ISBN: 3319937766 3319937758 Year: 2018 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This interdisciplinary volume brings together expert researchers coming from primatology, anthropology, ethology, philosophy of cognitive sciences, neurophysiology, mathematics and psychology to discuss both the foundations of non-human primate and human social cognition as well as the means there currently exist to study the various facets of social cognition. The first part focusses on various aspects of social cognition across primates, from the relationship between food and social behaviour to the connection with empathy and communication, offering a multitude of innovative approaches that range from field-studies to philosophy. The second part details the various epistemic and methodological means there exist to study social cognition, in particular how to ascertain the proximal and ultimate mechanisms of social cognition through experimental, modelling and field studies. In the final part, the mechanisms of cultural transmission in primate and human societies are investigated, and special attention is given to how the evolution of cognitive capacities underlie primates’ abilities to use and manufacture tools, and how this in turn influences their social ecology. A must-read for both, young scholars as well as established researchers!


Book
Practical Quantum Computing for Developers : Programming Quantum Rigs in the Cloud using Python, Quantum Assembly Language and IBM QExperience
Author:
ISBN: 1484242181 1484242173 Year: 2018 Publisher: Berkeley, CA : Apress : Imprint: Apress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Write algorithms and program in the new field of quantum computing. This book covers major topics such as the physical components of a quantum computer: qubits, entanglement, logic gates, circuits, and how they differ from a traditional computer. Also, Practical Quantum Computing for Developers discusses quantum computing in the cloud using IBM Q Experience including: the composer, quantum scores, experiments, circuits, simulators, real quantum devices, and more. You’ll be able to run experiments in the cloud on a real quantum device. Furthermore, this book shows you how to do quantum programming using the QISKit (Quantum Information Software Kit), Python SDK, and other APIs such as QASM (Quantum Assembly). You’ll learn to write code using these languages and execute it against simulators (local or remote) or a real quantum computer provided by IBM’s Q Experience. Finally, you’ll learn the current quantum algorithms for entanglement, random number generation, linear search, integer factorization, and others. You’ll peak inside the inner workings of the Bell states for entanglement, Grover’s algorithm for linear search, Shor’s algorithm for integer factorization, and other algorithms in the fields of optimization, and more. Along the way you’ll also cover game theory with the Magic Square, an example of quantum pseudo-telepathy where parties sharing entangled states can be observed to have some kind of communication between them. In this game Alice and Bob play against a referee. Quantum mechanics allows Alice and Bob to always win! By the end of this book, you will understand how this emerging technology provides massive parallelism and significant computational speedups over classical computers, and will be prepared to program quantum computers which are expected to replace traditional computers in the data center. You will: Use the Q Experience Composer, the first-of-its-kind web console to create visual programs/experiments and submit them to a quantum simulator or real device on the cloud Run programs remotely using the Q Experience REST API Write algorithms that provide superior performance over their classical counterparts Build a Node.js REST client for authenticating, listing remote devices, querying information about quantum processors, and listing or running experiments remotely in the cloud Create a quantum number generator: The quintessential coin flip with a quantum twist Discover quantum teleportation: This algorithm demonstrates how the exact state of a qubit (quantum information) can be transmitted from one location to another, with the help of classical communication and quantum entanglement between the sender and receiver Peek into single qubit operations with the classic game of Battleships with a quantum twist Handle the counterfeit coin problem: a classic puzzle that consists of finding a counterfeit coin in a beam balance among eight coins in only two turns.


Book
Analysis and Control of Coupled Neural Networks with Reaction-Diffusion Terms
Authors: --- --- ---
ISBN: 9811049076 9811049068 Year: 2018 Publisher: Singapore : Springer Singapore : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book introduces selected recent findings on the analysis and control of dynamical behaviors for coupled reaction-diffusion neural networks. It presents novel research ideas and essential definitions concerning coupled reaction-diffusion neural networks, such as passivity, adaptive coupling, spatial diffusion coupling, and the relationship between synchronization and output strict passivity. Further, it gathers research results previously published in many flagship journals, presenting them in a unified form. As such, the book will be of interest to all university researchers and graduate students in Engineering and Mathematics who wish to study the dynamical behaviors of coupled reaction-diffusion neural networks.


Book
Competition-Based Neural Networks with Robotic Applications
Authors: ---
ISBN: 9811049475 9811049467 Year: 2018 Publisher: Singapore : Springer Nature Singapore : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Focused on solving competition-based problems, this book designs, proposes, develops, analyzes and simulates various neural network models depicted in centralized and distributed manners. Specifically, it defines four different classes of centralized models for investigating the resultant competition in a group of multiple agents. With regard to distributed competition with limited communication among agents, the book presents the first distributed WTA (Winners Take All) protocol, which it subsequently extends to the distributed coordination control of multiple robots. Illustrations, tables, and various simulative examples, as well as a healthy mix of plain and professional language, are used to explain the concepts and complex principles involved. Thus, the book provides readers in neurocomputing and robotics with a deeper understanding of the neural network approach to competition-based problem-solving, offers them an accessible introduction to modeling technology and the distributed coordination control of redundant robots, and equips them to use these technologies and approaches to solve concrete scientific and engineering problems.

Keywords

Neural networks (Computer science) --- Robotics. --- Artificial neural networks --- Nets, Neural (Computer science) --- Networks, Neural (Computer science) --- Neural nets (Computer science) --- Engineering. --- Artificial intelligence. --- Neural networks (Computer science). --- Computational intelligence. --- Automation. --- Computational Intelligence. --- Robotics and Automation. --- Artificial Intelligence (incl. Robotics). --- Mathematical Models of Cognitive Processes and Neural Networks. --- Automation --- Machine theory --- Automatic factories --- Automatic production --- Computer control --- Engineering cybernetics --- Factories --- Industrial engineering --- Mechanization --- Assembly-line methods --- Automatic control --- Automatic machinery --- CAD/CAM systems --- Robotics --- Intelligence, Computational --- Artificial intelligence --- Soft computing --- Natural computation --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Construction --- Industrial arts --- Technology --- Artificial Intelligence. --- Neural networks (Computer science) . --- Control engineering. --- Control, Robotics, Automation. --- Control engineering --- Control equipment --- Control theory --- Engineering instruments --- Programmable controllers

Listing 1 - 10 of 23 << page
of 3
>>
Sort by