These two volumes consIstmg of Foundations and Applications provide the current status of theoretical and empirical developments in "computing with words". In philosophy, the twentieth century is said to be ...
详细信息
ISBN:
(数字)9783790818734
ISBN:
(纸本)9783790812176;9783662113622
These two volumes consIstmg of Foundations and Applications provide the current status of theoretical and empirical developments in "computing with words". In philosophy, the twentieth century is said to be the century of language. This is mainly due to Wittgenstein who said: "The meaning of a word is its use in the language game". "The concept game is a concept with blurred edges". In the first phrase, "the language game" implies the everyday human activity with language, and in the latter, "game" simply implies an ordinary word. Thus, Wittgenstein precisely stated that a word is fuzzy in real life. Unfortunately this idea about a word was not accepted in the conventional science. We had to wait for Zadeh's fuzzy sets theory. Remembering Wittgenstein's statement, we should consider, on the one hand, the concept of "computing with words" from a philosophical point of view. It deeply relates to the everyday use of a word in which the meaning of a word is fuzzy in its nature.
The rapid advancements in big data and the Internet of Things (IoT) have significantly accelerated the digital transformation of medical institutions, leading to the widespread adoption of Digital Twin Healthcare (DTH...
详细信息
The rapid advancements in big data and the Internet of Things (IoT) have significantly accelerated the digital transformation of medical institutions, leading to the widespread adoption of Digital Twin Healthcare (DTH). The Cloud DTH Platform (CDTH) serves as a cloud-based framework that integrates DTH models, healthcare resources, patient data, and medical services. By leveraging real-time data from medical devices, the CDTH platform enables intelligent healthcare services such as disease prediction and medical resource optimization. However, the platform functions as a system of systems (SoS), comprising interconnected yet independent healthcare services. This complexity is further compounded by the integration of both black-box AI models and domain-specific mechanistic models, which pose challenges in ensuring the interpretability and trustworthiness of DTH models. To address these challenges, we propose a Model-Based Systems engineering (MBSE)-driven DTH modeling methodology derived from systematic requirement and functional analyses. To implement this methodology effectively, we introduce a DTH model development approach using the X language, along with a comprehensive toolchain designed to streamline the development process. Together, this methodology and toolchain form a robust framework that enables engineers to efficiently develop interpretable and trustworthy DTH models for the CDTH platform. By integrating domain-specific mechanistic models with AI algorithms, the framework enhances model transparency and reliability. Finally, we validate our approach through a case study involving elderly patient care, demonstrating its effectiveness in supporting the development of DTH models that meet healthcare and interpretability requirements.
As an advanced carrier of on-board sensors, connected autonomous vehicle (CAV) can be viewed as an aggregation of self-adaptive systems with monitor-analyze-plan-execute (MAPE) for vehicle-related services. Meanwhile,...
详细信息
As an advanced carrier of on-board sensors, connected autonomous vehicle (CAV) can be viewed as an aggregation of self-adaptive systems with monitor-analyze-plan-execute (MAPE) for vehicle-related services. Meanwhile, machine learning (ML) has been applied to enhance analysis and plan functions of MAPE so that self-adaptive systems have optimal adaption to changing conditions. However, most of ML-based approaches don’t utilize CAVs’ connectivity to collaboratively generate an optimal learner for MAPE, because of sensor data threatened by gradient leakage attack (GLA). In this article, we first design an intelligent architecture for MAPE-based self-adaptive systems on Web 3.0-based CAVs, in which a collaborative machine learner supports the capabilities of managing systems. Then, we observe by practical experiments that importance sampling of sparse vector technique (SVT) approaches cannot defend GLA well. Next, we propose a fine-grained SVT approach to secure the learner in MAPE-based self-adaptive systems, that uses layer and gradient sampling to select uniform and important gradients. At last, extensive experiments show that our private learner spends a slight utility cost for MAPE (e.g., \(0.77\%\) decrease in accuracy) defending GLA and outperforms the typical SVT approaches in terms of defense (increased by \(10\%\sim 14\%\) attack success rate) and utility (decreased by \(1.29\%\) accuracy loss).
This book embarks on a journey through the captivating universe of cellular automata and discover its distinct realm, characterised by discrete time, space, and states, where cells form regular patterns and offer insi...
详细信息
ISBN:
(数字)9783031787577
ISBN:
(纸本)9783031787560;9783031787591
This book embarks on a journey through the captivating universe of cellular automata and discover its distinct realm, characterised by discrete time, space, and states, where cells form regular patterns and offer insights into complex systems across various domains. From theoretical foundations to practical applications, each chapter unveils innovative ideas and implementations, from solving initial value problems to exploring reversible computing and real-time pattern generation. Explore hyperbolic spaces, analyse elementary automata, and delve into network growth dynamics. Shedding light on synchronisation, control, and computational structures, this book is an invaluable resource for computer scientists, modellers, mathematicians, engineers, physicists, and professionals across disciplines. Immerse yourself in the intricate complexities and boundless potential of cellular automata, whether unravelling pedestrian dynamics or exploring cryptographic applications.
This book constitutes the refereed proceedings of the 8th International Conference on Autonomic and Trusted computing, ATC 2011, held in Banff, Canada, September 2011.;The 17 revised full papers presented together wit...
详细信息
ISBN:
(数字)9783642234965
ISBN:
(纸本)9783642234958
This book constitutes the refereed proceedings of the 8th International Conference on Autonomic and Trusted computing, ATC 2011, held in Banff, Canada, September 2011.;The 17 revised full papers presented together with 1 keynote speech were carefully reviewed and selected from numerous submissions. The papers address all current issues in autonomic architectures, models and systems, autonomic communications, trusted and secure computing, reliable, secure and trust applications.
This volume brings together the advanced research results obtained by the European COST Action 2102 "Cross Modal Analysis of Verbal and Nonverbal Communication", primarily discussed at the PINK SSPnet-COST21...
详细信息
ISBN:
(数字)9783642257759
ISBN:
(纸本)9783642257742
This volume brings together the advanced research results obtained by the European COST Action 2102 "Cross Modal Analysis of Verbal and Nonverbal Communication", primarily discussed at the PINK SSPnet-COST2102 International Conference on Analysis of Verbal and Nonverbal Communication and Enactment: The Processing Issues, held in Budapest, Hungary, in September 2010.
The 40 papers presented were carefully reviewed and selected for inclusion in the book. The volume is arranged into two scientific sections. The first section, Multimodal Signals: Analysis, Processing and Computational Issues, deals with conjectural and processing issues of defining models, algorithms, and heuristic strategies for data analysis, coordination of the data flow and optimal encoding of multi-channel verbal and nonverbal features. The second section, Verbal and Nonverbal Social Signals, presents original studies that provide theoretical and practical solutions to the modelling of timing synchronization between linguistic and paralinguistic expressions, actions, body movements, activities in human interaction and on their assistance for an effective human-machine interactions.
Most contemporary work on magnetic tunnel junctions either consider ballistic quantum transport across the tunneling barrer, for instance via the Non Equilibrium Green's Function (NEGF) formalism, or treat the tun...
详细信息
暂无评论