Innovations in Neural Information Paradigms and Applications


Book Description

Tremendous advances in all disciplines including engineering, science, health care, business, avionics, management, and so on, can also be attributed to the development of artificial intelligence paradigms. In fact, researchers are always interested in desi- ing machines which can mimic the human behaviour in a limited way. Therefore, the study of neural information processing paradigms have generated great interest among researchers, in that machine learning, borrowing features from human intelligence and applying them as algorithms in a computer friendly way, involves not only Mathem- ics and Computer Science but also Biology, Psychology, Cognition and Philosophy (among many other disciplines). Generally speaking, computers are fundamentally well-suited for performing au- matic computations, based on fixed, programmed rules, i.e. in facing efficiently and reliably monotonous tasks, often extremely time-consuming from a human point of view. Nevertheless, unlike humans, computers have troubles in understanding specific situations, and adapting to new working environments. Artificial intelligence and, in particular, machine learning techniques aim at improving computers behaviour in tackling such complex tasks. On the other hand, humans have an interesting approach to problem-solving, based on abstract thought, high-level deliberative reasoning and pattern recognition. Artificial intelligence can help us understanding this process by recreating it, then potentially enabling us to enhance it beyond our current capabilities.




Proceedings


Book Description




Brain-Inspired Information Technology


Book Description

"Brain-inspired information technology" is one of key concepts for the development of information technology in the next generation. Explosive progress of computer technology has been continuing based on a simple principle called "if-then rule". This means that the programmer of software have to direct every action of the computer programs in response to various inputs. There inherently is a limitation of complexity because we human have a limited capacity for managing complex systems. Actually, many bugs, mistakes of programming, exist in computer software, and it is quite difficult to extinguish them. The parts of computer programs where computer viruses attack are also a kind of programming mistakes, called security hole. Of course, human body or nervous system is not perfect. No creator or director, however, exists for us. The function of our brain is equipped by learning, self-organization, natural selection, and etc, resulting in adaptive and flexible information system. Brain-inspired information technology is aiming to realize such nature-made information processing system by using present computer system or specific hardware. To do so, researchers in various research fields are getting together to inspire each other and challenge cooperatively for the same goal.




Information Technology Innovation


Book Description

Information technology (IT) is widely understood to be the enabling technology of the 21st century. IT has transformed, and continues to transform, all aspects of our lives: commerce and finance, education, energy, health care, manufacturing, government, national security, transportation, communications, entertainment, science, and engineering. IT and its impact on the U.S. economyâ€"both directly (the IT sector itself) and indirectly (other sectors that are powered by advances in IT)â€"continue to grow in size and importance. IT’s impacts on the U.S. economyâ€"both directly (the IT sector itself) and indirectly (other sectors that are powered by advances in IT)â€"continue to grow. IT enabled innovation and advances in IT products and services draw on a deep tradition of research and rely on sustained investment and a uniquely strong partnership in the United States among government, industry, and universities. Past returns on federal investments in IT research have been extraordinary for both U.S. society and the U.S. economy. This IT innovation ecosystem fuels a virtuous cycle of innovation with growing economic impact. Building on previous National Academies work, this report describes key features of the IT research ecosystem that fuel IT innovation and foster widespread and longstanding impact across the U.S. economy. In addition to presenting established computing research areas and industry sectors, it also considers emerging candidates in both categories.




Advances in Intelligent Information Systems


Book Description

Intelligent Information Systems (IIS) can be defined as the next generation of Information Systems (IS) developed as a result of integration of AI and database (DB) technologies. IIS embody knowledge that allows them to exhibit intelligent behavior, allows them to cooperate with users and other systems in problem solving, discovery, retrieval, and manipulation of data and knowledge. For any IIS to serve its purpose, the information must be available when it is needed. This means that the computing systems used to store data and process the information, and the security controls used to protect it must be functioning correctly. This book covers some of the above topics and it is divided into four sections: Classification, Approximation and Data Security, Knowledge Management, and Application of IIS to medical and music domains.




Big Data and Blockchain Technology for Secure IoT Applications


Book Description

Big Data and Blockchain Technology for Secure IoT Applications presents a comprehensive exploration of the intersection between two transformative technologies: big data and blockchain, and their integration into securing Internet of Things (IoT) applications. As the IoT landscape continues to expand rapidly, the need for robust security measures becomes paramount to safeguard sensitive data and ensure the integrity of connected devices. This book delves into the synergistic potential of leveraging big data analytics and blockchain’s decentralized ledger system to fortify IoT ecosystems against various cyber threats, ranging from data breaches to unauthorized access. Within this groundbreaking text, readers will uncover the foundational principles underpinning big data analytics and blockchain technology, along with their respective roles in enhancing IoT security. Through insightful case studies and practical examples, this book illustrates how organizations across diverse industries can harness the power of these technologies to mitigate risks and bolster trust in IoT deployments. From real‐time monitoring and anomaly detection to immutable data storage and tamper‐proof transactions, the integration of big data and blockchain offers a robust framework for establishing secure, transparent, and scalable IoT infrastructures. Furthermore, this book serves as a valuable resource for researchers, practitioners, and policymakers seeking to navigate the complexities of IoT security. By bridging the gap between theory and application, this book equips readers with the knowledge and tools necessary to navigate the evolving landscape of interconnected devices while safeguarding against emerging cyber threats. With contributions from leading experts in the field, it offers a forward‐thinking perspective on harnessing the transformative potential of big data and blockchain to realize the full promise of the IoT securely.




Advances in Computational Intelligence


Book Description

This two-volume set LNCS 7902 and 7903 constitutes the refereed proceedings of the 12th International Work-Conference on Artificial Neural Networks, IWANN 2013, held in Puerto de la Cruz, Tenerife, Spain, in June 2013. The 116 revised papers were carefully reviewed and selected from numerous submissions for presentation in two volumes. The papers explore sections on mathematical and theoretical methods in computational intelligence, neurocomputational formulations, learning and adaptation emulation of cognitive functions, bio-inspired systems and neuro-engineering, advanced topics in computational intelligence and applications




Innovative Data Communication Technologies and Application


Book Description

This book presents the latest research in the fields of computational intelligence, ubiquitous computing models, communication intelligence, communication security, machine learning, informatics, mobile computing, cloud computing and big data analytics. The best selected papers, presented at the International Conference on Innovative Data Communication Technologies and Application (ICIDCA 2020), are included in the book. The book focuses on the theory, design, analysis, implementation and applications of distributed systems and networks.




Applications of Neural Networks in High Assurance Systems


Book Description

"Applications of Neural Networks in High Assurance Systems" is the first book directly addressing a key part of neural network technology: methods used to pass the tough verification and validation (V&V) standards required in many safety-critical applications. The book presents what kinds of evaluation methods have been developed across many sectors, and how to pass the tests. A new adaptive structure of V&V is developed in this book, different from the simple six sigma methods usually used for large-scale systems and different from the theorem-based approach used for simplified component subsystems.




Inductive Inference for Large Scale Text Classification


Book Description

Text classification is becoming a crucial task to analysts in different areas. In the last few decades, the production of textual documents in digital form has increased exponentially. Their applications range from web pages to scientific documents, including emails, news and books. Despite the widespread use of digital texts, handling them is inherently difficult - the large amount of data necessary to represent them and the subjectivity of classification complicate matters. This book gives a concise view on how to use kernel approaches for inductive inference in large scale text classification; it presents a series of new techniques to enhance, scale and distribute text classification tasks. It is not intended to be a comprehensive survey of the state-of-the-art of the whole field of text classification. Its purpose is less ambitious and more practical: to explain and illustrate some of the important methods used in this field, in particular kernel approaches and techniques.