Listing 1 - 10 of 43 | << page >> |
Sort by
|
Choose an application
Information systems --- 681.3*H51 --- Database management. --- Multimedia systems --- 681.3*H24 --- Computer-based multimedia information systems --- Multimedia computing --- Multimedia information systems --- Multimedia knowledge systems --- Information storage and retrieval systems --- Data base management --- Data services (Database management) --- Database management services --- DBMS (Computer science) --- Generalized data management systems --- Services, Database management --- Systems, Database management --- Systems, Generalized database management --- Electronic data processing --- Multimedia information systems: audio input/output, video, hypertext navigation --- Systems: concurrency; distributed systems; query processing; transaction processing (Database management) --- Multimedia systems. --- 681.3*H24 Systems: concurrency; distributed systems; query processing; transaction processing (Database management) --- 681.3*H51 Multimedia information systems: audio input/output, video, hypertext navigation --- Database management
Choose an application
Software agents are the latest advance in the trend toward smaller, modular pieces of code, where each module performs a well-defined, focused task or set of tasks. Programmed to interact with and provide services to other agents, including humans, software agents act autonomously with prescribed backgrounds, beliefs, and operations. Systems of agents can access and manipulate heterogeneously stored data such as that found on the Internet. After a discussion of the theory of software agents, this book presents IMPACT (Interactive Maryland Platform for Agents Collaborating Together), an experimental agent infrastructure that translates formal theories of agency into a functional multiagent system that can extend legacy software code and application-specific or legacy data structures. The book describes three sample applications: a store, a self-correcting auto-pilot, and a supply chain.
Intelligent agents (Computer software) --- Heterogeneous computing. --- Computer Science --- Engineering & Applied Sciences --- Heterogeneous processing (Computers) --- Agents, Autonomous (Computer software) --- Agents, Cognitive (Computer software) --- Agents, Intelligent (Computer software) --- Assistants, Cognitive (Computer software) --- Assistants, Intelligent software --- Autonomous agents (Computer software) --- Cognitive agents (Computer software) --- Cognitive assistants (Computer software) --- IAs (Computer software) --- Intelligent agent software --- Intelligent software agents --- Intelligent software assistants --- Software agents (Computer software) --- Special agents (Computer software) --- High performance computing --- Parallel processing (Electronic computers) --- Artificial intelligence --- Computer programs --- Heterogeneous computing --- E-books --- COMPUTER SCIENCE/Robotics & Agents --- Computers --- Enterprise Applications --- Business Intelligence Tools. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace
Choose an application
Computational Analysis of Terrorist Groups: Lashkar-e-Taiba provides an in-depth look at Web intelligence, and how advanced mathematics and modern computing technology can influence the insights we have on terrorist groups. This book primarily focuses on one famous terrorist group known as Lashkar-e-Taiba (or LeT), and how it operates. After 10 years of counter Al Qaeda operations, LeT is considered by many in the counter-terrorism community to be an even greater threat to the US and world peace than Al Qaeda. Computational Analysis of Terrorist Groups: Lashkar-e-Taiba is the first book that demonstrates how to use modern computational analysis techniques including methods for “big data” analysis. This book presents how to quantify both the environment in which LeT operate, and the actions it took over a 20-year period, and represent it as a relational database table. This table is then mined using sophisticated data mining algorithms in order to gain detailed, mathematical, computational and statistical insights into LeT and its operations. This book also provides a detailed history of Lashkar-e-Taiba based on extensive analysis conducted by using open source information and public statements. Each chapter includes a case study, as well as a slide describing the key results which are available on the authors’ web sites. Computational Analysis of Terrorist Groups: Lashkar-e-Taiba is designed for a professional market composed of government or military workers, researchers and computer scientists working in the web intelligence field. Advanced-level students in computer science will also find this valuable as a reference book.
Internet and terrorism. --- World Wide Web. --- Engineering & Applied Sciences --- Computer Science --- Computational intelligence. --- Data mining. --- Terrorism --- Jamat al-Dawa Pakistan. --- Acts of terrorism --- Attacks, Terrorist --- Global terrorism --- International terrorism --- Political terrorism --- Terror attacks --- Terrorist acts --- Terrorist attacks --- World terrorism --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Intelligence, Computational --- Jamat al-Dava Pakistan --- Lashkar-e-Taiba --- Lashkar-yi Tayyabah --- LeT --- Jamāʻatuddaʻvah Pākistān --- Lashkar-e-Tayyiba --- Lashkar-e-Tayyaba --- Jamaat-ud-Dawa Pakistan --- Jamaʻat-ud-Daʻawa Pākistān --- Falāḥ-i Insāniyat Fāʼunḍeshan --- Falah-e- Insaniat Foundation --- FIF --- FEF --- Computer science. --- Mathematical logic. --- Computers. --- Artificial intelligence. --- Application software. --- Computer Science. --- Information Systems and Communication Service. --- Artificial Intelligence (incl. Robotics). --- Data Mining and Knowledge Discovery. --- Computer Appl. in Social and Behavioral Sciences. --- Mathematical Logic and Formal Languages. --- Database searching --- Direct action --- Insurgency --- Political crimes and offenses --- Subversive activities --- Political violence --- Terror --- Artificial intelligence --- Soft computing --- Information systems. --- Social sciences --- Artificial Intelligence. --- Data processing. --- Informatics --- Science --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Algebra of logic --- Logic, Universal --- Mathematical logic --- Symbolic and mathematical logic --- Symbolic logic --- Mathematics --- Algebra, Abstract --- Metamathematics --- Set theory --- Syllogism --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Calculators --- Cyberspace
Choose an application
Terrorist groups throughout the world have been studied primarily through the use of social science methods. However, major advances in IT during the past decade have led to significant new ways of studying terrorist groups, making forecasts, learning models of their behaviour, and shaping policies about their behaviour. Handbook of Computational Approaches to Counterterrorism provides the first in-depth look at how advanced mathematics and modern computing technology is shaping the study of terrorist groups. This book includes contributions from world experts in the field, and presents extensive information on terrorism data sets, new ways of building such data sets in real-time using text analytics, introduces the mathematics and computational approaches to understand terror group behaviour, analyzes terror networks, forecasts terror group behaviour, and shapes policies against terrorist groups. Auxiliary information will be posted on the book’s website. This book targets defence analysts, counter terror analysts, computer scientists, mathematicians, political scientists, psychologists, and researchers from the wide variety of fields engaged in counter-terrorism research. Advanced-level students in computer science, mathematics and social sciences will also find this book useful.
Information Technology --- Artificial Intelligence --- Terrorism -- Prevention. --- Terrorism. --- Terrorism --- Mechanical Engineering --- Engineering & Applied Sciences --- Social Welfare & Social Work --- Social Sciences --- Computer Science --- Mechanical Engineering - General --- Criminology, Penology & Juvenile Delinquency --- Prevention --- Data processing --- Acts of terrorism --- Attacks, Terrorist --- Global terrorism --- International terrorism --- Political terrorism --- Terror attacks --- Terrorist acts --- Terrorist attacks --- World terrorism --- Computer science. --- Mathematical statistics. --- Data mining. --- Artificial intelligence. --- Application software. --- Computer Science. --- Artificial Intelligence (incl. Robotics). --- Probability and Statistics in Computer Science. --- Data Mining and Knowledge Discovery. --- Criminology and Criminal Justice, general. --- Computer Appl. in Social and Behavioral Sciences. --- Direct action --- Insurgency --- Political crimes and offenses --- Subversive activities --- Political violence --- Terror --- Criminology. --- Social sciences --- Artificial Intelligence. --- Data processing. --- Crime --- Criminals --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Informatics --- Science --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Study and teaching --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Mathematics --- Statistical inference --- Statistics, Mathematical --- Statistics --- Probabilities --- Sampling (Statistics) --- Statistical methods
Choose an application
Terrorist groups throughout the world have been studied primarily through the use of social science methods. However, major advances in IT during the past decade have led to significant new ways of studying terrorist groups, making forecasts, learning models of their behaviour, and shaping policies about their behaviour. Handbook of Computational Approaches to Counterterrorism provides the first in-depth look at how advanced mathematics and modern computing technology is shaping the study of terrorist groups. This book includes contributions from world experts in the field, and presents extensive information on terrorism data sets, new ways of building such data sets in real-time using text analytics, introduces the mathematics and computational approaches to understand terror group behaviour, analyzes terror networks, forecasts terror group behaviour, and shapes policies against terrorist groups. Auxiliary information will be posted on the book’s website. This book targets defence analysts, counter terror analysts, computer scientists, mathematicians, political scientists, psychologists, and researchers from the wide variety of fields engaged in counter-terrorism research. Advanced-level students in computer science, mathematics and social sciences will also find this book useful.
Social sciences (general) --- Demography --- Criminology. Victimology --- Operational research. Game theory --- Computer science --- Information systems --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- stochastische analyse --- analytische chemie --- biochemie --- computers --- informatica --- sociale wetenschappen --- criminologie --- database management --- informatietechnologie --- KI (kunstmatige intelligentie) --- computerkunde --- robots --- data acquisition --- AI (artificiële intelligentie)
Choose an application
Choose an application
This is the first study of Boko Haram that brings advanced data-driven, machine learning models to both learn models capable of predicting a wide range of attacks carried out by Boko Haram, as well as develop data-driven policies to shape Boko Haram’s behavior and reduce attacks by them. This book also identifies conditions that predict sexual violence, suicide bombings and attempted bombings, abduction, arson, looting, and targeting of government officials and security installations. After reducing Boko Haram’s history to a spreadsheet containing monthly information about different types of attacks and different circumstances prevailing over a 9 year period, this book introduces Temporal Probabilistic (TP) rules that can be automatically learned from data and are easy to explain to policy makers and security experts. This book additionally reports on over 1 year of forecasts made using the model in order to validate predictive accuracy. It also introduces a policy computation method to rein in Boko Haram’s attacks. Applied machine learning researchers, machine learning experts and predictive modeling experts agree that this book is a valuable learning asset. Counter-terrorism experts, national and international security experts, public policy experts and Africa experts will also agree this book is a valuable learning tool.
Machine learning. --- Data mining. --- Terrorism. --- Political violence. --- Machine Learning. --- Data Mining and Knowledge Discovery. --- Terrorism and Political Violence. --- Violence --- Political crimes and offenses --- Terrorism --- Acts of terrorism --- Attacks, Terrorist --- Global terrorism --- International terrorism --- Political terrorism --- Terror attacks --- Terrorist acts --- Terrorist attacks --- World terrorism --- Direct action --- Insurgency --- Subversive activities --- Political violence --- Terror --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Learning, Machine --- Artificial intelligence --- Machine theory --- Forecasting. --- Prevention. --- Boko Haram. --- Anti-terrorism --- Antiterrorism --- Counter-terrorism --- Counterterrorism --- BH (Boko Haram) --- Boko Harram --- Jamāʻat Ahl al-Sunnah li-Daʻwah wa-l-Jihād --- Jamāʻat Ahl al-Sunnah lil-Daʻwatihi wa-al-Jihād --- Jamāʻat Ahl as-Sunnah lid-Daʻwah wa-l-Jihād --- Jamaat Ahlussunah lid-Dawa wal-Jihad --- Jamaʼatu Ahlis Sunna Liddaʼawati Wal-Jihad --- Jama'atu Ahlisunnah Lida'awati wal-Jihad --- Jamaʼatul Alhul Sunnah Liddaʼwati wal jihad --- Jamatu Ahlis Sunna Lidawatti wal Jihad --- JAS (Jama'atu Ahlisunnah Lida'awati wal-Jihad) --- Nigerian Taliban --- People Committed to the Propagation of the Prophet's Teachings and Jihad --- Yusufiya --- جماعة اهل السنة للدعوة والجهاد --- Islamic State in West Africa Province --- Ansaru
Choose an application
Choose an application
Mathematical logic --- Artificial intelligence. Robotics. Simulation. Graphics --- wiskunde --- logica --- robots
Choose an application
Geodesy. Cartography --- Computer science --- Information systems --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- geodesie --- toegepaste informatica --- database management --- wiskunde --- KI (kunstmatige intelligentie) --- robots --- AI (artificiële intelligentie)
Listing 1 - 10 of 43 | << page >> |
Sort by
|