Narrow your search

Library

KU Leuven (11)

Odisee (10)

Thomas More Kempen (10)

Thomas More Mechelen (10)

UCLL (10)

VIVES (10)

AP (9)

KDG (9)

ULB (9)

ULiège (9)

More...

Resource type

book (19)

digital (9)


Language

English (28)


Year
From To Submit

2021 (3)

2020 (1)

2019 (4)

2018 (3)

2016 (2)

More...
Listing 1 - 10 of 28 << page
of 3
>>
Sort by

Book
Computational Red Teaming : Risk Analytics of Big-Data-to-Decisions Intelligent Systems
Author:
ISBN: 9783319082813 3319082809 9783319082806 3319082817 Year: 2015 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Written to bridge the information needs of management and computational scientists, this book presents the first comprehensive treatment of Computational Red Teaming (CRT).  The author describes an analytics environment that blends human reasoning and computational modeling to design risk-aware and evidence-based smart decision making systems. He presents the Shadow CRT Machine, which shadows the operations of an actual system to think with decision makers, challenge threats, and design remedies. This is the first book to generalize red teaming (RT) outside the military and security domains and it offers coverage of RT principles, practical and ethical guidelines. The author utilizes Gilbert’s principles for introducing a science. Simplicity: where the book follows a special style to make it accessible to a wide range of  readers. Coherence:  where only necessary elements from experimentation, optimization, simulation, data mining, big data, cognitive information processing, and system thinking are blended together systematically to present CRT as the science of Risk Analytics and Challenge Analytics. Utility: where the author draws on a wide range of examples, ranging from job interviews to Cyber operations, before presenting three case studies from air traffic control technologies, human behavior, and complex socio-technical systems involving real-time mining and integration of human brain data in the decision making environment.    • Presents first comprehensive treatment of Computational Red Teaming; • Provides balanced coverage of the topic from the perspectives of risk thinking and computational modeling; • Includes thorough coverage of the computational approach to the problem; • Links risk analytics and challenge analytics with the right set of computational tools to assess risk in complex, “big-data” situations.


Digital
Computational Red Teaming : Risk Analytics of Big-Data-to-Decisions Intelligent Systems
Author:
ISBN: 9783319082813 9783319082806 9783319082820 9783319384412 Year: 2015 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

Written to bridge the information needs of management and computational scientists, this book presents the first comprehensive treatment of Computational Red Teaming (CRT). The author describes an analytics environment that blends human reasoning and computational modeling to design risk-aware and evidence-based smart decision making systems. He presents the Shadow CRT Machine, which shadows the operations of an actual system to think with decision makers, challenge threats, and design remedies. This is the first book to generalize red teaming (RT) outside the military and security domains and it offers coverage of RT principles, practical and ethical guidelines. The author utilizes Gilbert’s principles for introducing a science. Simplicity: where the book follows a special style to make it accessible to a wide range of readers. Coherence: where only necessary elements from experimentation, optimization, simulation, data mining, big data, cognitive information processing, and system thinking are blended together systematically to present CRT as the science of Risk Analytics and Challenge Analytics. Utility: where the author draws on a wide range of examples, ranging from job interviews to Cyber operations, before presenting three case studies from air traffic control technologies, human behavior, and complex socio-technical systems involving real-time mining and integration of human brain data in the decision making environment. • Presents first comprehensive treatment of Computational Red Teaming; • Provides balanced coverage of the topic from the perspectives of risk thinking and computational modeling; • Includes thorough coverage of the computational approach to the problem; • Links risk analytics and challenge analytics with the right set of computational tools to assess risk in complex, “big-data” situations.


Book
Shepherding UxVs for human-swarm teaming : an artificial intelligence approach to unmanned X vehicles
Authors: ---
ISBN: 3030608980 3030608972 Year: 2021 Publisher: Cham, Switzerland : Springer,


Digital
Progress in Artificial Life : Third Australian Conference; ACAL 2007 Gold Coast, Australia, December 4-6, 2007 Proceedings
Authors: --- ---
ISBN: 9783540769316 Year: 2007 Publisher: Berlin, Heidelberg Springer-Verlag Berlin Heidelberg


Digital
Shepherding UxVs for Human-Swarm Teaming : An Artificial Intelligence Approach to Unmanned X Vehicles
Authors: ---
ISBN: 9783030608989 9783030608996 9783030609009 9783030608972 Year: 2021 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book draws inspiration from natural shepherding, whereby a farmer utilizes sheepdogs to herd sheep, to inspire a scalable and inherently human friendly approach to swarm control. The book discusses advanced artificial intelligence (AI) approaches needed to design smart robotic shepherding agents capable of controlling biological swarms or robotic swarms of unmanned vehicles. These smart shepherding agents are described with the techniques applicable to the control of Unmanned X Vehicles (UxVs) including air (unmanned aerial vehicles or UAVs), ground (unmanned ground vehicles or UGVs), underwater (unmanned underwater vehicles or UUVs), and on the surface of water (unmanned surface vehicles or USVs). This book proposes how smart 'shepherds' could be designed and used to guide a swarm of UxVs to achieve a goal while ameliorating typical communication bandwidth issues that arise in the control of multi agent systems. The book covers a wide range of topics ranging from the design of deep reinforcement learning models for shepherding a swarm, transparency in swarm guidance, and ontology-guided learning, to the design of smart swarm guidance methods for shepherding with UGVs and UAVs. The book extends the discussion to human-swarm teaming by looking into the real-time analysis of human data during human-swarm interaction, the concept of trust for human-swarm teaming, and the design of activity recognition systems for shepherding. Presents a comprehensive look at human-swarm teaming; Tackles artificial intelligence techniques for swarm guidance; Provides artificial intelligence techniques for real-time human performance analysis.


Book
Simulation and Computational Red Teaming for Problem Solving.
Authors: --- ---
ISBN: 9781119527107 Year: 2019 Publisher: Newark John Wiley & Sons, Incorporated

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

E-books


Book
Recent Advances in Computational Intelligence in Defense and Security
Authors: --- --- ---
ISBN: 3319264486 3319264508 Year: 2016 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This volume is an initiative undertaken by the IEEE Computational Intelligence Society’s Task Force on Security, Surveillance and Defense to consolidate and disseminate the role of CI techniques in the design, development and deployment of security and defense solutions. Applications range from the detection of buried explosive hazards in a battlefield to the control of unmanned underwater vehicles, the delivery of superior video analytics for protecting critical infrastructures or the development of stronger intrusion detection systems and the design of military surveillance networks. Defense scientists, industry experts, academicians and practitioners alike will all benefit from the wide spectrum of successful applications compiled in this volume. Senior undergraduate or graduate students may also discover uncharted territory for their own research endeavors.


Book
Dual phase evolution
Authors: --- ---
ISBN: 1441984224 1441984232 Year: 2014 Publisher: New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book explains how dual phase evolution operates in all these settings and provides a detailed treatment of the subject. The authors discuss the theoretical foundations for the theory, how it relates to other phase transition phenomena and its advantages in evolutionary computation and complex adaptive systems. The book provides methods and techniques to use this concept for problem solving. Dual phase evolution concerns systems that evolve via repeated phase shifts in the connectivity of their elements. It occurs in vast range of settings, including natural systems (species evolution, landscape ecology, geomorphology), socio-economic systems (social networks) and in artificial systems (annealing, evolutionary computing).


Book
Foundations of Trusted Autonomy
Authors: --- ---
ISBN: 3319648160 3319648152 Year: 2018 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book is open access under a CC BY 4.0 license. This book establishes the foundations needed to realize the ultimate goals for artificial intelligence, such as autonomy and trustworthiness. Aimed at scientists, researchers, technologists, practitioners, and students, it brings together contributions offering the basics, the challenges and the state-of-the-art on trusted autonomous systems in a single volume. The book is structured in three parts, with chapters written by eminent researchers and outstanding practitioners and users in the field. The first part covers foundational artificial intelligence technologies, while the second part covers philosophical, practical and technological perspectives on trust. Lastly, the third part presents advanced topics necessary to create future trusted autonomous systems. The book augments theory with real-world applications including cyber security, defence and space.

Keywords

Engineering. --- Algorithms. --- Artificial intelligence. --- Computer mathematics. --- Robotics. --- Automation. --- Electronics. --- Microelectronics. --- Robotics and Automation. --- Artificial Intelligence (incl. Robotics). --- Electronics and Microelectronics, Instrumentation. --- Computational Mathematics and Numerical Analysis. --- Algorithm Analysis and Problem Complexity. --- Microminiature electronic equipment --- Microminiaturization (Electronics) --- Electronics --- Microtechnology --- Semiconductors --- Miniature electronic equipment --- Electrical engineering --- Physical sciences --- Automatic factories --- Automatic production --- Computer control --- Engineering cybernetics --- Factories --- Industrial engineering --- Mechanization --- Assembly-line methods --- Automatic control --- Automatic machinery --- CAD/CAM systems --- Robotics --- Automation --- Machine theory --- Computer mathematics --- Discrete mathematics --- Electronic data processing --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Logic machines --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Algorism --- Algebra --- Arithmetic --- Construction --- Industrial arts --- Technology --- Mathematics --- Foundations --- Computer science --- Computer software. --- Artificial Intelligence. --- Mathematics. --- Software, Computer --- Computer systems --- Trusted Autonomy --- Automation Technology --- Autonomous Systems --- Self-Governance --- Trusted Autonomous Systems --- Design of Algorithms and Methodologies --- Control engineering. --- Control, Robotics, Automation. --- Data processing. --- Control engineering --- Control equipment --- Control theory --- Engineering instruments --- Programmable controllers


Book
Evolutionary Computation and Complex Networks
Authors: --- ---
ISBN: 3319600001 3319599984 Year: 2019 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book introduces the linkage between evolutionary computation and complex networks and the advantages of cross-fertilising ideas from both fields. Instead of introducing each field individually, the authors focus on the research that sits at the interface of both fields. The book is structured to address two questions: (1) how complex networks are used to analyze and improve the performance of evolutionary computation methods? (2) how evolutionary computation methods are used to solve problems in complex networks? The authors interweave complex networks and evolutionary computing, using evolutionary computation to discover community structure, while also using network analysis techniques to analyze the performance of evolutionary algorithms.The book is suitable for both beginners and senior researchers in the fields of evolutionary computation and complex networks. Brings together the fields of evolutionary computation and complex networks, discussing them both qualitatively and quantitatively; Provides novel and efficient computational problem solving techniques that require little computer memory; Provides the pseudo-codes for the computational methods used in the book to enable readers to adopt the codes to their own problems.

Listing 1 - 10 of 28 << page
of 3
>>
Sort by