Atnaujinkite slapukų nuostatas

El. knyga: Instinctive Computing

  • Formatas: PDF+DRM
  • Išleidimo metai: 09-Jan-2017
  • Leidėjas: Springer London Ltd
  • Kalba: eng
  • ISBN-13: 9781447172789
Kitos knygos pagal šią temą:
  • Formatas: PDF+DRM
  • Išleidimo metai: 09-Jan-2017
  • Leidėjas: Springer London Ltd
  • Kalba: eng
  • ISBN-13: 9781447172789
Kitos knygos pagal šią temą:

DRM apribojimai

  • Kopijuoti:

    neleidžiama

  • Spausdinti:

    neleidžiama

  • El. knygos naudojimas:

    Skaitmeninių teisių valdymas (DRM)
    Leidykla pateikė šią knygą šifruota forma, o tai reiškia, kad norint ją atrakinti ir perskaityti reikia įdiegti nemokamą programinę įrangą. Norint skaityti šią el. knygą, turite susikurti Adobe ID . Daugiau informacijos  čia. El. knygą galima atsisiųsti į 6 įrenginius (vienas vartotojas su tuo pačiu Adobe ID).

    Reikalinga programinė įranga
    Norint skaityti šią el. knygą mobiliajame įrenginyje (telefone ar planšetiniame kompiuteryje), turite įdiegti šią nemokamą programėlę: PocketBook Reader (iOS / Android)

    Norint skaityti šią el. knygą asmeniniame arba „Mac“ kompiuteryje, Jums reikalinga  Adobe Digital Editions “ (tai nemokama programa, specialiai sukurta el. knygoms. Tai nėra tas pats, kas „Adobe Reader“, kurią tikriausiai jau turite savo kompiuteryje.)

    Negalite skaityti šios el. knygos naudodami „Amazon Kindle“.

This book attempts to connect artificial intelligence to primitive intelligence. It explores the idea that a genuinely intelligent computer will be able to interact naturally with humans. To form this bridge, computers need the ability to recognize, understand and even have instincts similar to humans. The author organizes the book into three parts. He starts by describing primitive problem-solving, discussing topics like default mode, learning, tool-making, pheromones and foraging. Part two then explores behavioral models of instinctive cognition by looking at the perception of motion and event patterns, appearance and gesture, behavioral dynamics, figurative thinking, and creativity. The book concludes by exploring instinctive computing in modern cybernetics, including models of self-awareness, stealth, visual privacy, navigation, autonomy, and survivability.









Instinctive Computing reflects upon systematic thinking for designing cyber-physical systems and it would be a stimulating reading for those who are interested in artificial intelligence, cybernetics, ethology, human-computer interaction, data science, computer science, security and privacy, social media, or autonomous robots.

Recenzijos

This is a very well-written and well-organized book with a massive collection of references. It also contains a useful index, which will assist the reader with navigation. it will certainly pique the interest of students and professionals within the computing field. Summing Up: Recommended. Graduate students, faculty, and professionals. (J. Beidler, Choice, Vol. 54 (12), August, 2017)

Part I Primitive Problem-Solving
1 Introduction
3(10)
Historical Models of Instincts
4(4)
Behavioral Tests
8(1)
The Instinctive Computing Model
9(2)
Book Overview
11(2)
2 Default Mode
13(22)
Default Operations
13(3)
Anticipating Exceptions
14(1)
Graceful Degeneration
15(1)
Spontaneous Alternation Behavior
16(2)
Path Alternation
17(1)
Collision Recovery
17(1)
Least Effort
18(1)
Alignment
19(3)
Following Behavior
20(1)
Empathic Conversation
21(1)
Default Knowledge
22(8)
Inheritance
24(1)
Analogy
24(1)
Stereotypes
25(2)
Proportions
27(3)
Primitive Physics
30(3)
Chemotaxis
30(2)
Sense of Gravity
32(1)
Summary
33(2)
3 Pheromone Trails
35(20)
Pheromone Deposit and Decay
36(1)
Pheromone Map
36(5)
Light Painting
36(1)
Traffic Heat Map
37(2)
Motion Energy Image -- All Pheromones
39(1)
Motion History Image -- Pheromone Decay
40(1)
Deposit Sequences and Frequencies
41(2)
Pheromones in Social Media
43(7)
Visual Pheromones
44(1)
Psycholinguistic Pheromones
45(5)
Alarm Pheromones
50(2)
Depression Alert
50(1)
Ad-Hoc Safety Check
51(1)
Earthquake Early Warning Systems (EEWS)
52(1)
Summary
52(3)
4 Foraging Behaviors
55(20)
Collective Foraging
55(5)
Pheromone Paths
55(2)
Quorum Recruiting
57(2)
Tactile Communication
59(1)
Serendipitous Foraging
60(7)
Crawlers
60(2)
Interception
62(1)
Fishing
63(2)
Mechanical Turk
65(2)
Scanning and Tracking
67(7)
Saccadic Gazing
68(4)
Foveal Vision
72(2)
Summary
74(1)
5 Primitive Learning
75(20)
Perceptual Adaption
75(3)
Peak Shift
78(2)
Lateral Learning
80(1)
Learn-by-Probing
80(5)
Hill-Climbing and Randomization
81(1)
Scanning and Tracking in Learning
81(1)
Pedestrian Detection Case
82(1)
Landmine Detection Case
83(2)
Projected Memory
85(3)
Learn from Virtual Experience
88(5)
Virtual Crash Dummies
89(1)
Virtual Reality Training for Robots
90(2)
Role-Play Games
92(1)
Summary
93(2)
6 Tool Making
95(24)
Self-Tooling
95(4)
Adaptive Design for the Human Body
95(2)
Adaptive Design for Machines
97(2)
Limb Extension
99(3)
Scaffolding
102(2)
Physical Scaffolding
102(2)
Cognitive Scaffolding
104(1)
Substitution
104(5)
Diagram Languages
105(2)
Substitution in Machine Learning
107(2)
Self-Assembling
109(3)
Self-Replicating
112(2)
Adversary Tooling Behaviors
114(1)
Summary
115(4)
Part II Instinctive Cognition
7 Perceiving Motion Patterns
119(24)
Discovery of the Planet Pluto
119(7)
Spatial Mapping
121(1)
Temporal Scaling
122(1)
Looping and Motion Memory
123(1)
Alignment for Visualization
124(2)
Motion and Vision
126(1)
Gamefication
127(4)
The "First-Person" View
128(1)
Collective Intelligence
128(1)
Physics Engine
129(1)
Scalability
130(1)
Randomization
131(1)
Filtering
131(4)
Continuity Filter
131(3)
Curvature Filter
134(1)
Artifacts and Motion Cognition
135(7)
Eye Gaze in Response to the Spatial and Temporal Filtering
136(1)
Brainwaves (EEG) in Response to the Spatial and Temporal Filtering
137(5)
Summary
142(1)
8 Sensuality
143(22)
Humanoid Robosapien
143(2)
Sensual Voices
145(10)
Voice Actors
146(1)
Voice Transformation
147(8)
Sensual Shape
155(3)
Sensual Gaits
158(5)
Shoulder-Hip Trapezoid and Triangles
158(2)
Modeling Gaits
160(3)
Summary
163(2)
9 Euphoria Dynamics
165(22)
Orgasmatron
165(1)
The Burst Firing Effect
166(4)
Physical Circuit Simulation
170(1)
Optimal Input
171(1)
Simulation of Dopamine Dynamics
172(3)
Understanding Music Patterns
175(3)
Euphoric Dynamics of Social Media
178(5)
Discharge in Social Media
183(2)
Discharge in Trust Systems
185(1)
Summary
185(2)
10 Describing Faces
187(26)
How Do We See a Face?
188(2)
Facial Geometries
190(2)
Semantic Representations
192(4)
Multiple Resolution Descriptions
193(1)
Semantic Differential Representation
194(2)
Symbol-Number Descriptions
196(1)
Analogical Descriptions
197(1)
Shape Recognition in Words
198(1)
Pareidolia Phenomenon
199(2)
The Mean Faces
201(2)
Crowdsourcing for Facial Reconstruction
203(8)
Spearman-Brown Prediction Formula
205(1)
Facial Composite Experiment
206(5)
Summary
211(2)
11 Figurative Thinking
213(20)
Figurative Abstraction
213(3)
Design a Pictographic Language
216(1)
Structural Composition Grammars
217(2)
Encoding Pictographs
219(3)
New Age Pictographs
222(5)
Emoji
223(2)
Visual Passcode
225(1)
Emoji Programming Language
226(1)
Do Pictographs Fit Zipf's Law?
227(3)
Instinctive Words in Cyber Space
230(2)
Summary
232(1)
12 Machine Creativity
233(22)
The Constructionism Model
233(1)
Morphological Generation
234(4)
Tapping into Dreams
238(6)
Improvisation by Abstraction
244(1)
Evolving Prototypes
245(4)
Virtual Experience
249(1)
Summary
250(5)
Part III Evolving Cybernetics
13 Self-Awareness
255(30)
Self-Awareness Model
255(2)
Self-Recognition in Immune Systems
257(6)
T Cell Receptors
258(2)
Artificial Immune Systems
260(3)
Identifying by Behaviors
263(6)
The Mirror Test
263(1)
Voices, Keystrokes, Locations, and Gestures
264(5)
Are You Human or Robot?
269(1)
Mai ware Behaviors
269(7)
Self-Awareness in Malware
270(2)
Malware Behavior Profiling
272(4)
Visualizing Malicious Behaviors
276(4)
The SQL Attack
277(2)
Insider Threats
279(1)
Collective Consciousness
280(3)
Summary
283(2)
14 Stealth
285(18)
White Noise
285(2)
Dedicated Channels
287(2)
Frequency Hopping
289(3)
Steganography
292(9)
The Least Significant Bits (LSB)
293(1)
Image Transformation
294(2)
Video Steganography
296(3)
Network Steganography
299(2)
Steganalysis
301(1)
Summary
301(2)
15 Visual Privacy
303(16)
Evolving Personal Space
303(2)
One-Way Mirrors and Smart Glass
305(3)
Webcam Privacy
308(1)
The Body Scan Problem'
309(3)
Privacy-Aware Rendering
309(2)
Usability Study
311(1)
Privacy Study with Simulation
312(1)
Digital Human Models
313(3)
Detecting Human Features
315(1)
Detecting Anomalous Objects on Skin
316(2)
Summary
318(1)
16 Navigating and Covering
319(18)
Simon's Ant
319(1)
Wall Following
320(1)
Navigating a Maze
321(2)
Pheromone-Based Navigation
323(1)
Traveling Workstation Problem (TWP)
324(4)
Hansel and Gretel Algorithm
328(4)
The Tessellator Robot
332(3)
Summary
335(2)
17 Autonomy
337(16)
Robot Ethics
337(4)
Human Factors in Automation
341(4)
Machine Overrides Human
341(1)
Human Overrides Machine
342(1)
The Overlay Control
343(2)
Elements of Autonomy Design
345(6)
Observability and Controllability
345(1)
Complexity
346(5)
Summary
351(2)
18 Survivability
353(20)
Measurements of Survivability
353(2)
Cliff Detection
355(1)
Collision Avoidance
356(1)
Energy Harvest
357(1)
Cache Behavior
358(2)
Self-Amputation
360(1)
Self-Expiration
361(1)
Isolation
361(2)
Self-Healing
363(1)
Improvisation
364(1)
Migration
364(1)
Teamwork
365(1)
Dependency Analysis
365(3)
Mental Time Travel with Episodic Memory
368(3)
Summary
371(2)
References 373(10)
Index 383