Handbook of Computational Approaches to Counterterrorism


Book Description

Terrorist groups throughout the world have been studied primarily through the use of social science methods. However, major advances in IT during the past decade have led to significant new ways of studying terrorist groups, making forecasts, learning models of their behaviour, and shaping policies about their behaviour. Handbook of Computational Approaches to Counterterrorism provides the first in-depth look at how advanced mathematics and modern computing technology is shaping the study of terrorist groups. This book includes contributions from world experts in the field, and presents extensive information on terrorism data sets, new ways of building such data sets in real-time using text analytics, introduces the mathematics and computational approaches to understand terror group behaviour, analyzes terror networks, forecasts terror group behaviour, and shapes policies against terrorist groups. Auxiliary information will be posted on the book’s website. This book targets defence analysts, counter terror analysts, computer scientists, mathematicians, political scientists, psychologists, and researchers from the wide variety of fields engaged in counter-terrorism research. Advanced-level students in computer science, mathematics and social sciences will also find this book useful.




Proceedings of the 18th International Conference on Computing in Civil and Building Engineering


Book Description

This book gathers the latest advances, innovations, and applications in the field of information technology in civil and building engineering, presented at the 18th International Conference on Computing in Civil and Building Engineering (ICCCBE), São Paulo, Brazil, August 18-20, 2020. It covers highly diverse topics such as BIM, construction information modeling, knowledge management, GIS, GPS, laser scanning, sensors, monitoring, VR/AR, computer-aided construction, product and process modeling, big data and IoT, cooperative design, mobile computing, simulation, structural health monitoring, computer-aided structural control and analysis, ICT in geotechnical engineering, computational mechanics, asset management, maintenance, urban planning, facility management, and smart cities. Written by leading researchers and engineers, and selected by means of a rigorous international peer-review process, the contributions highlight numerous exciting ideas that will spur novel research directions and foster multidisciplinary collaborations.




Data Driven Modeling, Monitoring and Control for Smart and Connected Systems


Book Description

Information revolution is turning modern engineering systems into smart and connected systems. The smart and connected systems are defined by three characteristics: tangible physical components that comprise the system, connectivity among components that enables data acquisition and sharing, and smart data analytics and decision making capability. Examples of smart and connected systems include GM's OnStar® tele-service system and the InSite® tele-monitoring system from GE. The unprecedented data availability in smart and connected systems provides significant opportunities for data analytics. For example, since we have observations from potentially a very large number of similar units, we can compare their operations, share the information, and extract some common knowledge to enable accurate prediction and control at the individual level. In addition, for a complex system such as multistage manufacturing processes, we can collect synchronized data from multiple stations within the system so that we can identify the operational relationships among these stations. Such relationship can enable better process control. On the other hand, the tremendous data volume and types also reveal critical challenges. First, the high dimensional data with heterogeneity often poses difficulties in sharing common information within/across similar units/processes in the smart and connected systems. This problem becomes more severe when the system under the start-up period, where insufficient data and experience could result in the deficiency of data driven approaches. Second, the non-Gaussian data and non-linear relationship among various units impede the quantitative description of the inter-relationship of processes in the smart and connected systems. Although existing non-parametric methods, e.g., Kriging, can deal with these situations to some extent, limited description power (focus on mean value prediction) and lack of physical interpretation are the common drawbacks in these methods. Moreover, the real time monitoring and control for the smart and connected systems require efficient and scalability algorithms and strategies to meet the rapid and large scale response under advanced sensing and data acquisition environment. Lastly, the efficient control of the smart and connected systems also becomes challenging due to the complex relationship among units. Data-driven methods are required to meet the exigent demands for effectively formulating and solving the control problem. To address the issues listed above, four tasks are investigated in this dissertation under different applications in the smart and connected systems. [1] Transfer learning among heterogeneous multistage manufacturing processes. A series of data analytical methods for modeling and learning inter-relationships among product quality characteristics in multistage connected manufacturing processes are developed. The methods offer a rigorous way to reveal commonalities among heterogeneous data from different manufacturing processes to benefit the learning in complex connected manufacturing processes. [2] Statistical modeling and inference for Key Performance Indicators (KPI) in production systems. A surrogate model for inference and prediction at distribution level of different KPIs is developed. This model utilizes the pair-copula construction to capture the non-linear association in the non-Gaussian data. [3] Real time contamination detection in water distribution network. A contamination source identification framework is proposed for real time tracking and detection of contamination released in the urban water distribution network. The framework utilizes the Bayesian theory to sequentially update the posterior probability for determining the contamination source upon very limited sensor readings. [4] Control of KPIs in manufacturing production systems. The KPI control problem is formulated as a stochastic optimization problem, where the noise distribution in the cost function depends on the decision variables. The standard uniform distributions are employed to link the KPI relationship surrogate model and the objective function to efficiently solve the KPI control problem. The proposed methods can be applied to a broad range of data analytics problems, and the emerging challenges in modeling, monitoring and control of smart and connected systems can be effectively addressed.




Complex, Intelligent and Software Intensive Systems


Book Description

This book aims to deliver a platform of scientific interaction between the three interwoven challenging areas of research and development of future ICT-enabled applications: software intensive systems, complex systems and intelligent systems. Software intensive systems are systems, which heavily interact with other systems, sensors, actuators, devices, other software systems and users. More and more domains are involved with software intensive systems, e.g., automotive, telecommunication systems, embedded systems in general, industrial automation systems and business applications. Moreover, the outcome of web services delivers a new platform for enabling software intensive systems. Complex systems research is focused on the overall understanding of systems rather than its components. Complex systems are very much characterized by the changing environments in which they act by their multiple internal and external interactions. They evolve and adapt through internal and external dynamic interactions. The development of intelligent systems and agents, which is each time more characterized by the use of ontologies and their logical foundations, builds a fruitful impulse for both software intensive systems and complex systems. Recent research in the field of intelligent systems, robotics, neuroscience, artificial intelligence and cognitive sciences are very important factor for the future development and innovation of software intensive and complex systems.




From Maps to Models


Book Description

The United States faces numerous, varied, and evolving threats to national security, including terrorism, scarcity and disruption of food and water supplies, extreme weather events, and regional conflicts around the world. Effectively managing these threats requires intelligence that not only assesses what is happening now, but that also anticipates potential future threats. The National Geospatial-Intelligence Agency (NGA) is responsible for providing geospatial intelligence on other countriesâ€"assessing where exactly something is, what it is, and why it is importantâ€"in support of national security, disaster response, and humanitarian assistance. NGA's approach today relies heavily on imagery analysis and mapping, which provide an assessment of current and past conditions. However, augmenting that approach with a strong modeling capability would enable NGA to also anticipate and explore future outcomes. A model is a simplified representation of a real-world system that is used to extract explainable insights about the system, predict future outcomes, or explore what might happen under plausible what-if scenarios. Such models use data and/or theory to specify inputs (e.g., initial conditions, boundary conditions, and model parameters) to produce an output. From Maps to Models: Augmenting the Nation's Geospatial Intelligence Capabilities describes the types of models and analytical methods used to understand real-world systems, discusses what would be required to make these models and methods useful for geospatial intelligence, and identifies supporting research and development for NGA. This report provides examples of models that have been used to help answer the sorts of questions NGA might ask, describes how to go about a model-based investigation, and discusses models and methods that are relevant to NGA's mission.




Computational Collective Intelligence. Semantic Web, Social Networks and Multiagent Systems


Book Description

Computational collective intelligence (CCI) is most often understood as a subfield of artificial intelligence (AI) dealing with soft computing methods that enable group decisions to be made or knowledge to be processed among autonomous units acting in distributed environments. The needs for CCI techniques and tools have grown signi- cantly recently as many information systems work in distributed environments and use distributed resources. Web-based systems, social networks and multi-agent systems very often need these tools for working out consistent knowledge states, resolving conflicts and making decisions. Therefore, CCI is of great importance for today’s and future distributed systems. Methodological, theoretical and practical aspects of computational collective int- ligence, such as group decision making, collective action coordination, and knowledge integration, are considered as the form of intelligence that emerges from the collabo- tion and competition of many individuals (artificial and/or natural). The application of multiple computational intelligence technologies such as fuzzy systems, evolutionary computation, neural systems, consensus theory, etc. , can support human and other collective intelligence and create new forms of CCI in natural and/or artificial s- tems.




Current Approaches in Applied Artificial Intelligence


Book Description

This book constitutes the refereed conference proceedings of the 28th International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems, IEA/AIE 2015, held in Seoul, South Korea, in June 2015. The 73 revised full papers presented were carefully reviewed and selected from 105 submissions. The papers cover a wide range of topics in applied artificial intelligence including reasoning, robotics, cognitive modeling, machine learning, pattern recognition, optimization, text mining, social network analysis, and evolutionary algorithms. They are organized in the following topical sections: theoretical AI, knowledge-based systems, optimization, Web and social networks, machine learning, classification, unsupervised learning, vision, image and text processing, and intelligent systems applications.




Proceedings of the International Conference on Data Engineering and Communication Technology


Book Description

This two-volume book contains research work presented at the First International Conference on Data Engineering and Communication Technology (ICDECT) held during March 10–11, 2016 at Lavasa, Pune, Maharashtra, India. The book discusses recent research technologies and applications in the field of Computer Science, Electrical and Electronics Engineering. The aim of the Proceedings is to provide cutting-edge developments taking place in the field data engineering and communication technologies which will assist the researchers and practitioners from both academia as well as industry to advance their field of study.




Security Engineering for Embedded and Cyber-Physical Systems


Book Description

Digital transformation, also known as Industry 4.0, Smart Industry, and Smart Manufacturing, is at the top of leaders’ agendas. Such a transformation stimulates innovation in new products and services, the digital transformation of processes, and the creation of new business models and ecosystems. In the world of manufacturing, Industry 4.0 is based on various technological advances, among which we can mainly cite CPS (cyber-physical systems), IoT (Internet of Things), and IoS (internet of services). While engaging, this fourth wave also brings significant challenges for manufacturers. Business operations and the supply chain are becoming more vulnerable to cyber threats. Security Engineering for Embedded and Cyber-Physical Systems is an invaluable resource to discover cybersecurity and privacy techniques for embedded and cyber-physical systems. This book presents the latest studies and research results on all aspects of security engineering for embedded and cyber-physical systems. It also provides a premier interdisciplinary reference for researchers, practitioners, and educators to discover the most recent innovations, trends, concerns, and practical challenges encountered and solutions adopted in security engineering for embedded and cyber-physical systems. The book offers comprehensive coverage of the essential topics, including the following: Embedded and cyber-physical systems threats and vulnerabilities Security engineering techniques for embedded and cyber-physical systems Security engineering for embedded and cyber-physical systems and potential future-use cases Artificial intelligence techniques for cybersecurity and privacy Security engineering for Internet of Things Blockchain for cybersecurity in embedded and cyber-physical systems This book comprises a number of state-of-the-art contributions from both scientists and practitioners working in security engineering for embedded and cyber-physical systems. It aspires to provide a relevant reference for students, researchers, engineers, and professionals working in this area or those interested in grasping its diverse facets and exploring the latest advances and future trends related to security engineering for embedded and cyber-physical systems.