Book Description




Micro-syntactic Variation in North American English


Book Description

Comparative work on linguistic varieties that are overall very similar can help us determine where and how exactly grammatical systems differ from one another, and how they change over time. This book explores a range of data on unfamiliar constructions across regional and social dialects, thereby shedding light on the varieties under examination and on the properties of English syntax more generally.







Advances in Intelligent Systems and Computing II


Book Description

This book reports on new theories and applications in the field of intelligent systems and computing. It covers computational and artificial intelligence methods, as well as advances in computer vision, current issues in big data and cloud computing, computation linguistics, and cyber-physical systems. It also reports on data mining and knowledge extraction technologies, as well as central issues in intelligent information management. Written by active researchers, the respective chapters are based on papers presented at the International Conference on Computer Science and Information Technologies (CSIT 2017), held on September 5–8, 2017, in Lviv, Ukraine; and at two workshops accompanying the conference: one on inductive modeling, jointly organized by the Lviv Polytechnic National University and the National Academy of Science of Ukraine; and another on project management, which was jointly organized by the Lviv Polytechnic National University, the International Project Management Association, the Ukrainian Project Management Association, the Kazakhstan Project Management Association, and Nazarbayev University. Given its breadth of coverage, the book provides academics and professionals with extensive information and a timely snapshot of the field of intelligent systems, and is sure to foster new discussions and collaborations among different groups.




Proceedings of the 3rd International Conference on Intelligent Technologies and Engineering Systems (ICITES2014)


Book Description

This book includes the original, peer reviewed research from the 3rd International Conference on Intelligent Technologies and Engineering Systems (ICITES2014), held in December, 2014 at Cheng Shiu University in Kaohsiung, Taiwan. Topics covered include: Automation and robotics, fiber optics and laser technologies, network and communication systems, micro and nano technologies and solar and power systems. This book also Explores emerging technologies and their application in a broad range of engineering disciplines Examines fiber optics and laser technologies Covers biomedical, electrical, industrial and mechanical systems Discusses multimedia systems and applications, computer vision and image & video signal processing




Advances in Signal Processing and Intelligent Recognition Systems


Book Description

This book constitutes the refereed proceedings of the 5th International Symposium on Advances in Signal Processing and Intelligent Recognition Systems, SIRS 2019, held in Trivandrum, India, in December 2019. The 19 revised full papers and 8 revised short papers presented were carefully reviewed and selected from 63 submissions. The papers cover wide research fields including information retrieval, human-computer interaction (HCI), information extraction, speech recognition.




Artificial Intelligence and Cybersecurity


Book Description

This book discusses artificial intelligence (AI) and cybersecurity from multiple points of view. The diverse chapters reveal modern trends and challenges related to the use of artificial intelligence when considering privacy, cyber-attacks and defense as well as applications from malware detection to radio signal intelligence. The chapters are contributed by an international team of renown researchers and professionals in the field of AI and cybersecurity. During the last few decades the rise of modern AI solutions that surpass humans in specific tasks has occurred. Moreover, these new technologies provide new methods of automating cybersecurity tasks. In addition to the privacy, ethics and cybersecurity concerns, the readers learn several new cutting edge applications of AI technologies. Researchers working in AI and cybersecurity as well as advanced level students studying computer science and electrical engineering with a focus on AI and Cybersecurity will find this book useful as a reference. Professionals working within these related fields will also want to purchase this book as a reference.




Intelligent Tutoring Systems


Book Description

This book presents the refereed proceedings of the Third International Conference on Intelligent Tutoring Systems, ITS '96, held in Montreal, Canada, in June 1996. The book contains 69 revised papers selected from a total of 128 submissions; also included are six invited papers from well-known speakers. All in all, the book reflects the state-of-the-art in the area. In particular the following topics are covered: advising systems, ITS architectures, cognitive models, design issues, empirical studies, formal models, learning environments, real-world applications, software tools for tutoring, student modelling, teaching and learning strategies, and multimedia and WWW.




The Smart Set


Book Description




Ubiquitous Intelligence and Computing


Book Description

This book constitutes the refereed proceedings of the 4th International Conference on Ubiquitous Intelligence and Computing, UIC 2007, held in Hong Kong, China in July 2007, co-located with ATC 2007, the 4th International Conference on Autonomic and Trusted Computing. The 119 revised full papers presented together with 1 keynote paper and 1 invited paper were carefully reviewed and selected from 463 submissions. The papers are organized in topical sections on smart objects and embedded systems, smart spaces/environments/services, ad-hoc and intelligent networks, sensor networks, pervasive communication and mobile systems, context-aware applications and systems, service oriented middleware and applications, intelligent computing: models and services, as well as security, safety and privacy.