Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Type of Medium
Language
Region
Access
  • 1
    UID:
    almahu_9949767382902882
    Format: 1 online resource (249 pages)
    Edition: 1st ed.
    ISBN: 9783031548277
    Note: Intro -- Foreword by Florian Schütz -- Foreword by Jan Kleijssen -- Preface -- Acknowledgments -- Contents -- List of Contributors -- Reviewers -- Acronyms -- Part I Introduction -- 1 From Deep Neural Language Models to LLMs -- 1.1 What LLMs Are and What LLMs Are Not -- 1.2 Principles of LLMs -- 1.2.1 Deep Neural Language Models -- 1.2.2 Generative Deep Neural Language Models -- 1.2.3 Generating Text -- 1.2.4 Memorization vs Generalization -- 1.2.5 Effect of the Model and Training Dataset Size -- References -- 2 Adapting LLMs to Downstream Applications -- 2.1 Prompt Optimization -- 2.2 Pre-Prompting and Implicit Prompting -- 2.3 Model Coordination: Actor-Agents -- 2.4 Integration with Tools -- 2.5 Parameter-Efficient Fine-Tuning -- 2.6 Fine-Tuning -- 2.7 Further Pretraining -- 2.8 From-Scratch Re-Training -- 2.9 Domain-Specific Distillation -- References -- 3 Overview of Existing LLM Families -- 3.1 Introduction -- 3.2 Pre-Transformer LLMs -- 3.3 BERT and Friends -- 3.4 GPT Family Proper -- 3.5 Generative Autoregressors (GPT Alternatives) -- 3.6 Compute-Optimal Models -- 3.6.1 LLaMA Family -- 3.7 Full-Transformer/Sequence-to-Sequence Models -- 3.8 Multimodal and Mixture-of-Experts Models -- 3.8.1 Multimodal Visual LLMs -- 3.8.2 Pathways Language Model, PaLM -- 3.8.3 GPT-4 and BingChat -- References -- 4 Conversational Agents -- 4.1 Introduction -- 4.2 GPT Related Conversational Agents -- 4.3 Alternative Conversational Agent LLMs -- 4.3.1 Conversational Agents Without Auxiliary Capabilities -- 4.3.2 Conversational Agents With Auxiliary Capabilities -- 4.3.2.1 Models With Non-Knowledge Auxiliary Capabilities -- 4.4 Conclusion -- References -- 5 Fundamental Limitations of Generative LLMs -- 5.1 Introduction -- 5.2 Generative LLMs Cannot Be Factual -- 5.3 Generative LLMs With Auxiliary Tools Still Struggle To Be Factual. , 5.4 Generative LLMs Will Leak Private Information -- 5.5 Generative LLMs Have Trouble With Reasoning -- 5.6 Generative LLMs Forget Fast and Have a Short Attention Span -- 5.7 Generative LLMs Are Only Aware of What They Saw at Training -- 5.8 Generative LLMs Can Generate Highly Inappropriate Texts -- 5.9 Generative LLMs Learn and Perpetrate Societal Bias -- References -- 6 Tasks for LLMs and Their Evaluation -- 6.1 Introduction -- 6.2 Natural Language Tasks -- 6.2.1 Reading Comprehension -- 6.2.2 Question Answering -- 6.2.3 Common Sense Reasoning -- 6.2.4 Natural Language Generation -- 6.3 Conclusion -- References -- Part II LLMs in Cybersecurity -- 7 Private Information Leakage in LLMs -- 7.1 Introduction -- 7.2 Information Leakage -- 7.3 Extraction -- 7.4 Jailbreaking -- 7.5 Conclusions -- References -- 8 Phishing and Social Engineering in the Age of LLMs -- 8.1 LLMs in Phishing and Social Engineering -- 8.2 Case Study: Orchestrating Large-Scale Scam Campaigns -- 8.3 Case Study: Shā Zhū Pán Attacks -- References -- 9 Vulnerabilities Introduced by LLMs Through Code Suggestions -- 9.1 Introduction -- 9.2 Relationship Between LLMs and Code Security -- 9.2.1 Vulnerabilities and Risks Introduced by LLM-Generated Code -- 9.3 Mitigating Security Concerns With LLM-Generated Code -- 9.4 Conclusion and The Path Forward -- References -- 10 LLM Controls Execution Flow Hijacking -- 10.1 Faulting Controls: The Genesis of Execution Flow Hijacking -- 10.2 Unpacking Execution Flow: LLMs' Sensitivity to User-Provided Text -- 10.3 Examples of LLMs Execution Flow Attacks -- 10.4 Securing Uncertainty: Security Challenges in LLMs -- 10.5 Security by Design: Shielding Probabilistic Execution Flows -- References -- 11 LLM-Aided Social Media Influence Operations -- 11.1 Introduction -- 11.2 Salience of LLMs -- 11.3 Potential Impact -- 11.4 Mitigation -- References. , 12 Deep(er) Web Indexing with LLMs -- 12.1 Introduction -- 12.2 Innovation Through Integration of LLMs -- 12.3 Navigating Complexities: Challenges and Mitigation Strategies -- 12.3.1 Desired Behavior of LLM-Based Search Query Creation Tools -- 12.3.2 Engineering Challenges and Mitigations -- 12.3.2.1 Ethical and Security Concerns -- 12.3.2.2 Fidelity of Query Responses and Model Accuracy -- 12.3.2.3 Linguistic and Regulatory Variations -- 12.3.2.4 Handling Ambiguous Queries -- 12.4 Key Takeaways -- 12.5 Conclusion and Reflections -- References -- Part III Tracking and Forecasting Exposure -- 13 LLM Adoption Trends and Associated Risks -- 13.1 Introduction -- 13.2 In-Context Learning vs Fine-Tuning -- 13.3 Adoption Trends -- 13.3.1 LLM Agents -- 13.4 Potential Risks -- References -- 14 The Flow of Investments in the LLM Space -- 14.1 General Context: Investments in the Sectors of AI, ML, and Text Analytics -- 14.2 Discretionary Evidence -- 14.3 Future Work with Methods Already Applied to AI and ML -- References -- 15 Insurance Outlook for LLM-Induced Risk -- 15.1 General Context of Cyber Insurance -- 15.1.1 Cyber-Risk Insurance -- 15.1.2 Cybersecurity and Breaches Costs -- 15.2 Outlook for Estimating the Insurance Premia of LLMs Cyber Insurance -- References -- 16 Copyright-Related Risks in the Creation and Useof ML/AI Systems -- 16.1 Introduction -- 16.2 Concerns of Owners of Copyrighted Works -- 16.3 Concerns of Users Who Incorporate Content Generated by ML/AI Systems Into Their Creations -- 16.4 Mitigating the Risks -- References -- 17 Monitoring Emerging Trends in LLM Research -- 17.1 Introduction -- 17.2 Background -- 17.3 Data and Methods: Noun Extraction -- 17.4 Results -- 17.4.1 Domain Experts Validation and Interpretations -- 17.5 Discussion, Limitations and Further Research -- 17.6 Conclusion -- References -- Part IV Mitigation. , 18 Enhancing Security Awareness and Education for LLMs -- 18.1 Introduction -- 18.2 Security Landscape of LLMs -- 18.3 Foundations of LLM Security Education -- 18.4 The Role of Education in Sub-Areas of LLM Deployment and Development -- 18.5 Empowering Users Against Security Breaches and Risks -- 18.6 Advanced Security Training for LLM Users -- 18.7 Conclusion and the Path Forward -- References -- 19 Towards Privacy Preserving LLMs Training -- 19.1 Introduction -- 19.2 Dataset Pre-processing with Anonymization and De-duplication -- 19.3 Differential Privacy for Fine-Tuning Models -- 19.4 Differential Privacy for Deployed Models -- 19.5 Conclusions -- References -- 20 Adversarial Evasion on LLMs -- 20.1 Introduction -- 20.2 Evasion Attacks in Image Classification -- 20.3 Impact of Evasion Attacks on the Theory of Deep Learning -- 20.4 Evasion Attacks for Language Processing and Applicability to Large Language Models -- References -- 21 Robust and Private Federated Learning on LLMs -- 21.1 Introduction -- 21.1.1 Peculiar Challenges of LLMs -- 21.2 Robustness to Malicious Clients -- 21.3 Privacy Protection of Clients' Data -- 21.4 Synthesis of Robustness and Privacy -- 21.5 Concluding Remarks -- References -- 22 LLM Detectors -- 22.1 Introduction -- 22.2 LLMs' Salience -- 22.2.1 General Detectors -- 22.2.2 Specific Detectors -- 22.3 Potential Mitigation -- 22.3.1 Watermarking -- 22.3.2 DetectGPT -- 22.3.3 Retrieval Based -- 22.4 Mitigation -- References -- 23 On-Site Deployment of LLMs -- 23.1 Introduction -- 23.2 Open-Source Development -- 23.3 Technical Solution -- 23.3.1 Serving -- 23.3.2 Quantization -- 23.3.3 Energy Costs -- 23.4 Risk Assessment -- References -- 24 LLMs Red Teaming -- 24.1 History and Evolution of Red-Teaming Large Language Models -- 24.2 Making LLMs Misbehave -- 24.3 Attacks -- 24.3.1 Classes of Attacks on Large Language Models. , 24.3.1.1 Prompt-Level Attacks -- 24.3.1.2 Contextual Limitations: A Fundamental Weakness -- 24.3.1.3 Mechanisms of Distractor and Formatting Attacks -- 24.3.1.4 The Role of Social Engineering -- 24.3.1.5 Integration of Fuzzing and Automated Machine Learning Techniques for Scalability -- 24.4 Datasets -- 24.5 Defensive Mechanisms Against Manual and Automated Attacks on LLMs -- 24.6 The Future -- Appendix -- References -- 25 Standards for LLM Security -- 25.1 Introduction -- 25.2 The Cybersecurity Landscape -- 25.2.1 MITRE CVEs -- 25.2.2 CWE -- 25.2.3 MITRE ATT& -- CK and Cyber Kill Chain -- 25.3 Existing Standards -- 25.3.1 AI RMF Playbook -- 25.3.2 OWASP Top 10 for LLMs -- 25.3.3 AI Vulnerability Database -- 25.3.4 MITRE ATLAS -- 25.4 Looking Ahead -- References -- Part V Conclusion -- 26 Exploring the Dual Role of LLMs in Cybersecurity: Threats and Defenses -- 26.1 Introduction -- 26.2 LLM Vulnerabilities -- 26.2.1 Security Concerns -- 26.2.1.1 Data Leakage -- 26.2.1.2 Toxic Content -- 26.2.1.3 Disinformation -- 26.2.2 Attack Vectors -- 26.2.2.1 Backdoor Attacks -- 26.2.2.2 Prompt Injection Attacks -- 26.2.3 Testing LLMs -- 26.3 Code Creation Using LLMs -- 26.3.1 How Secure is LLM-Generated Code? -- 26.3.2 Generating Malware -- 26.4 Shielding with LLMs -- 26.5 Conclusion -- References -- 27 Towards Safe LLMs Integration -- 27.1 Introduction -- 27.2 The Attack Surface -- 27.3 Impact -- 27.4 Mitigation -- References.
    Additional Edition: Print version: Kucharavy, Andrei Large Language Models in Cybersecurity Cham : Springer International Publishing AG,c2024 ISBN 9783031548260
    Language: English
    Keywords: Electronic books.
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    almahu_9949850812002882
    Format: XXXII, 701 p. 127 illus., 102 illus. in color. , online resource.
    Edition: 1st ed. 2024.
    ISBN: 9783031538773
    Series Statement: CSR, Sustainability, Ethics & Governance,
    Content: This book brings together research that advances our ‎understanding of the fundamental relationship between board diversity and different ‎aspects of corporate governance, including corporate governance disclosures, board ‎performance, governance characteristics, and ownership structure. ‎The expertly selected chapters deal with related (but not limited) to the following topics: ‎Corporate governance models and diversity; forms of diversity and decisions in the boardroom; Board diversity, corporate disclosure, and intellectual capital disclosures; shareholder activism; differences between private and family firms; Board diversity laws; gender and ethnicity on boards, and going beyond gender aspects of diversity. This book is particularly useful for researchers and practitioner think tanks to understand the state of the art in board diversity research.
    Note: Effect of Reporting and Governance on Performance, with Online Digital Media as Moderating among Malaysian Waqf Institutions: A Pilot Study -- Young Talent Development Challenges: The Characteristics Of Indonesian Generation Z In Determining Their Job -- Workcation in Smart Tourism: Measuring Impact on Employees Well-being, Performance, and Engagement for Business Competitiveness -- The Level of Digital Competence and its Relationship to the Quality of E-learning among Faculty Members in Jordanian Universities -- Client's Intention and Their Willingness To Participate At The Rehabilitation Centre: Focusing On Malaysian Women's Perspective -- Rebuilding Malaysia's tourism industry Global effects of the Covid 19 pandemic and its resurgence strategies -- Impact of COVID-19 on Agile Software Development -- Professional Character Development in Islamic Military Leadership: Developing a Theoretical Framework -- A Self-Efficacy Sign Language Web Prototype: MUTAPP -- The Relationship Between MarketPenetration and Performance of Selected Small and Medium Enterprise -- Innovative Solution For Kids With Diabetes: Augmented Reality Mobile Application For Insulin Intake -- Should Torture be Justified in an Extreme Circumstances to Prevent Terrorism? -- Correlational Analyses of Mathematics Anxiety and Mathematics Performance -- Unraveling Social Medias Issues on Public Opinion and Activism: A Thematic Review -- Recycling Awareness Through Mobile Application: Selecting The Categories Of Recyclable Materials For Environmental Well Being -- From Grades to the Workplace: Unveiling the Link between Academic Performance and Internship Success -- The Impact of Colour Vision Defects on Travel Destination Selection -- The Effect of Green Marketing Mix on Customer Psychological Attitudes and Purchase Intention Within the Beauty Industry in Mauritius -- Factors Affecting Graduates Employability Skills: Quantitative Study on Employees in Brunei -- Exploring Gender and Race Discrimination in Recruitment for Extractive Industries in Mozambique -- Factors Influencing the Adoption E-Services in Oman Higher Education Sector -- Advancements in Technology for Pharmaceutical Packaging: A Review of Technology, Contributions and Applied Areas -- The Effect of Supply Chain Innovation on Corporate Sustainability and Performance -- The Impact of Guerilla Marketing Strategies on Business Performance and Sustainable Competitive Advantage of SMEs in Pakistan -- Strategic Improvement Model on Document Management Process for a Non-Digital Hospital -- Automated Irrigation System for Paddy Field -- Graduate Employability in Malaysia: The Influencing Factors for Malaysian Tertiary Students -- Enhancing Pandemic Safety with MobileNetV2: Real-time Facemask Detection -- Factors Influencing Online Banking Satisfaction In Malaysia -- Developing a Structural Model for Lifelong Music Learning Intention among Chinese University Students -- A Structured Literature Review on the Modelling Educational Video for Student Learning in Higher Education Institution -- The Had Kifayah Model for Asnaf Students at UiTM Kelantan Branch -- Mapping the Landscape: A Bibliometric Review Of Food Security Research In Malaysia -- Capital Structure Determinants of Bursa Malaysia PN17 Firms -- Preparing Practical Learning Through the Development of Education for Sustainable Development, ESD EDU Simulator -- The Alarming Shift from Earnings Management to Fraudulent Reporting -- Beyond Aesthetics: Reviews on Industrial Design Students' Creative Process Upon Developing Cultural-Oriented Products -- The effect of population growth and production on shallot prices in East Java Province in 2014-2022 -- The Concept of Islamic Spiritualism in Dealing With Plague and Infectious Disease Outbreaks -- Key Determinants of Slow Fashion (Batik) Apparel Purchase Intention among Malaysian Consumers: A Conceptual Paper -- Moolang Virtual Classroom: A Comparative of Students' Learning Preferences and Gender on Learning Outcomes -- Implementation of the Financial Technology Industry on MSMEs in Malang, Indonesia; A Phenomenological Analysis using Critical Thinking Model -- Transformation of Accounting Information Systems in the Management of BUMDesa Financial Performance in the Digitalization Era -- A Serious Game for Jawi Alphabets Literacy Based on Gamification Elements -- Deep Learning Model using Long Short- Term Memory (LSTM) for Time-series Forecasting of Traffic Volume in Malaysia -- Integrating Technology into Interior Design Education: A Paradigm Shift in Teaching and Learning -- Dissemination of Teaching Excellence in the Quality Process of Accreditation in Higher Education -- Will Metaverse Bridge the Gap between Authentic Education and Virtual Education? -- The role of administrative control in upgrading the localities -- The Reality of the Quality of Education in Postgraduate Programs at Palestine Technical University - Kadoorie from Students' Point of View -- Dewey's and Freire's ideas about dialogue and communication and their implications for student engagement in applied learning -- The effect of Strategic Management Accounting Techniques (SMAT) as an accounting technology on improving Business performance : A Review from Contigency and Resource Based View Approach -- Global Smuggling Research Trends: A Bibliometric Analysis of an Untold Story -- The Indicators of Happiness Among Academicians: A Systematic Literature Review (SLR) Analysis -- The Analysis Of Sustainability Development Among Msmes: Normative Pillar And Cultural-Cognitive Pillar -- The Impact of Presenteeism on Employee Productivity: A literature review.
    In: Springer Nature eBook
    Additional Edition: Printed edition: ISBN 9783031538766
    Additional Edition: Printed edition: ISBN 9783031538780
    Additional Edition: Printed edition: ISBN 9783031538797
    Language: English
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Berlin, Heidelberg :Springer Berlin Heidelberg,
    UID:
    almahu_9947920625702882
    Format: VIII, 378 p. , online resource.
    ISBN: 9783540481034
    Series Statement: Lecture Notes in Computer Science, Lecture Notes in Artificial Intelligence, 745
    Content: Perceptual processes in humans and machines, investigated and simulated by means of the computational approach, are the subject matter of this volume. Researchers in artificial intelligence, pattern recognition, and psychology discuss aspects of vision, speech understanding, sensory-motor coordination, and their interplay with cognitive and behavioral functionalities. The papers adopt the computational approach as the basic research paradigm. Connectionist models, numerical and statistical techniques, symbolic (logic-based) formalisms, and hybrid representations provide the formal background to the research. Some of the papers were prepared for a workshop held in Trieste, Italy, in October 1992.
    Note: Gestalt problems in cognitive psychology: Field theory, invariance and auto-organisation -- Neural network learning in an ecological and evolutionary context -- Trends in pattern recognition -- Computer vision systems: Functionality and structure integration -- On the use of auditory models in speech technology -- Automatic speech recognition with neural networks: Beyond nonparametric models -- New shape from Shading methods -- Orientation-dependent effects in neural networks -- Identification of pattern dimensionality by self-organization -- A Markovian model for perceptual grouping of different shape primitives -- Segmented image reduction -- Design and acquisition of a task-oriented spontaneous-speech database -- Language and ambiguity -- Spatial Logic for image representation and retrieval-by-contents -- Communication among perceiving agents -- Perception of mental states from communication -- Perceptual grouping for scene interpretation in an active vision system -- Using viewer-centered representations in machine vision -- A non-linear integration process for the selection of visual information -- Distributed perceptive paradigms: Preliminary statements -- Anticipatory tracking of a moving object -- A time-to-crash detector based on area expansions: Example of an opto-motor reflex -- “Intelligent” telepresence: Introducing virtual reality in advanced robots.
    In: Springer eBooks
    Additional Edition: Printed edition: ISBN 9783540573791
    Language: English
    Subjects: Computer Science
    RVK:
    RVK:
    Keywords: Aufsatzsammlung
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Cham :Springer International Publishing AG,
    UID:
    almahu_9949602162902882
    Format: 1 online resource (167 pages)
    Edition: 1st ed.
    ISBN: 9783030342586
    Series Statement: Springer Texts in Education Series
    Note: Intro -- Acknowledgements -- Introduction -- Reference -- Contents -- 1 Background and Earlier Research -- Abstract -- References -- 2 Contemporary Perspectives on Teaching -- Abstract -- 2.1 The Need to Adapt Teaching to Student Characteristics -- 2.2 Didactic Design -- References -- Bibliographic Recommendations -- 3 Basic Concepts in Information Literacy -- Abstract -- 3.1 Information Literacy Concept -- 3.2 Equivalence of the Concept in Various Languages -- 3.3 Objectives of Information Literacy -- 3.4 International Concerns on Information Literacy -- 3.5 Competencies in Information Literacy -- 3.6 Standards of Information Literacy -- 3.6.1 Structure of Standards -- 3.6.2 International Standards of Information Literacy -- 3.7 Models of Information Literacy -- 3.7.1 SCONUL Model -- 3.7.2 CILIP Information Literacy Model -- 3.7.3 Seven Faces of Information Literacy in Higher Education -- References -- Webography -- Bibliographic Recommendations: Definitions and Models-Information Literacy Website -- 4 Accessing Information -- Abstract -- 4.1 Defining the Need of Information -- 4.1.1 Expressing and Defining the Need of Information -- 4.2 Research Question -- 4.3 Research Strategies -- 4.4 Keywords -- 4.5 Using a Thesaurus -- 4.6 Boolean Logic Operators -- 4.7 Search of Phrases -- 4.8 Truncation -- Webography -- Bibliographic Recommendations -- How Do I Search for Information? -- Finding Information for Your Research Paper -- 5 Locating and Retrieving Information -- Abstract -- 5.1 Traditional Information Sources-Libraries -- 5.2 Cataloguing -- 5.2.1 Bibliographic Description -- 5.2.2 Descriptive Features -- 5.2.3 Classification -- 5.2.4 Indexing -- 5.2.5 Thesaurus -- References -- Webography -- Bibliographic Recommendations -- 6 Information Search Strategies -- Abstract -- 6.1 Traditional Library Catalogues. , 6.1.1 Search Information on Internet -- 6.1.2 MetaSearch Tools -- Webography -- Bibliographic Recommendations -- 7 Information Evaluation -- Abstract -- 7.1 Evaluation of Scientific Series Publications (Journals) -- 7.2 Peer Review Process -- 7.3 Bibliometric Databases -- 7.4 Clarivate Analitycs-WoS -- 7.4.1 Impact Factor -- 7.4.2 LibGuides: Journal Impact Factors: Home -- 7.4.3 H-index, HIRSH Index -- 7.5 Conclusion -- 7.6 Web Resources Evaluation -- Webography -- 8 Information Management -- Abstract -- 8.1 Using Information in the Research Process -- 8.1.1 Role of Citation Process -- 8.1.2 Principles of Describing Information Sources -- 8.1.3 Citation Methods -- 8.1.3.1 Numerical Citation Method (Vancouver Style) -- 8.1.3.2 Citation of the First Element and Publishing Date Method (Havard Style) -- 8.2 Citation Styles -- 8.2.1 "Author-Date" System (Harvard System) -- 8.2.2 "Author-Title"/"Author-Page" Style -- 8.2.3 Sequential Number System or "Author-Number" (Vancouver System) -- 8.2.4 References in a Notes System -- 8.2.5 Citation "Anatomy" -- 8.2.5.1 Printed Information Sources -- 8.2.5.2 Electronic Information Sources -- 8.2.5.3 Other Information Sources -- 8.2.5.4 Unpublished Information Sources -- 8.3 Using Microsoft Office Word-References -- 8.3.1 Steps for Automatic Bibliography Generation -- 8.4 Other Publications Identification Elements: International Codes for Publications -- 8.4.1 International Standard Book Number -- 8.4.2 International Standard Serial Number -- 8.4.3 International Standard Music Number -- 8.4.4 Digital Object Identifier -- References -- Bibliographic Recommendations -- 9 Information Communication -- Abstract -- 9.1 Ethical Use of Information -- 9.1.1 Plagiarism -- 9.1.2 Citation -- 9.1.3 Plagiarism Detection -- 9.1.3.1 Plagiarism Detection for Text Documents -- 9.1.3.2 Operation of Plagiarism Detection Systems. , 9.2 Intellectual Property. Copyright. Legislation -- 9.3 Information Communication -- 9.3.1 Creating and Presenting Academic Works -- 9.3.2 Presentation of Scientific Results -- 9.3.2.1 Form of Scientific Communication -- 9.3.2.2 Information Presentation -- References -- Webography -- Bibliographical Recommendations -- 10 Teaching Learning Methods -- Abstract -- 10.1 Teaching Strategies -- 10.2 Methods and Training Procedures -- 10.2.1 The Relationship Between the Method and Procedure -- 10.3 Classifications of Teaching-Learning Methods -- 10.4 Descriptions of the Methods Used in the Examples in Previous Chapters -- Bibliographic Recommendations -- Webography for the Whole Book.
    Additional Edition: Print version: Landøy, Ane Collaboration in Designing a Pedagogical Approach in Information Literacy Cham : Springer International Publishing AG,c2019 ISBN 9783030342579
    Language: English
    Keywords: Electronic books.
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    almahu_9949685719502882
    Format: XXI, 485 p. 141 illus., 107 illus. in color. , online resource.
    Edition: 1st ed. 2024.
    ISBN: 9789819998364
    Series Statement: Frontiers of Artificial Intelligence, Ethics and Multidisciplinary Applications,
    Content: This groundbreaking proceedings volume explores the integration of Artificial Intelligence (AI) across key domains-healthcare, finance, education, robotics, industrial and other engineering applications -unveiling its transformative potential and practical implications. With a multidisciplinary lens, it transcends technical aspects, fostering a comprehensive understanding while bridging theory and practice. Approaching the subject matter with depth, the book combines theoretical foundations with real-world case studies, empowering researchers, professionals, and enthusiasts with the knowledge and tools to effectively harness AI. Encompassing diverse AI topics-machine learning, natural language processing, computer vision, data analytics and supervisory control - the volume showcases state-of-the-art techniques propelling AI advancements. Structured into four parts: Part 1: Artificial Intelligence (AI), explores evolving deep neural networks, reinforcement learning, and explainable AI, providing a deep dive into the technical foundations of AI advancements. Part 2: Robotics and Control Systems, delves into the integration of AI in robotics and automatic control, addressing supervisory control, automated robotic movement coordination, anomaly detection, dynamic programming, and fault tolerance, offering insights into the evolving landscape of intelligent automation. Part 3: AI and Society, examines the societal impact of AI through chapters on ethical considerations, economic growth, environmental engagements, and hazard management, providing a holistic perspective on AI's role in shaping society. Part 4: PhD Symposium, presents the future of AI through cutting-edge research, covering legal and ethical dimensions, privacy considerations, and computationally efficient solutions, offering a glimpse into the next generation of AI advancements. Catering to a diverse audience-from industry leaders to students-the volume consolidates the expertise of renowned professionals, serving as a comprehensive resource for navigating the ever-evolving AI landscape. An essential reference for those staying at the forefront of AI developments. .
    Note: Advances in AI - NLP, Vision, Voice, and Self-taught AI Systems -- Soft Computing and Evolutionary Computing -- Neuro Evolutionary Techniques -- Innovations in AI methods, techniques, and algorithms -- Explainable AI -- AI and Robotics -- AI and Automatic Control -- AI and Cloud -- AI and IoT -- Intelligent Engineering Systems, Expert Systems -- Knowledge-Based Systems.
    In: Springer Nature eBook
    Additional Edition: Printed edition: ISBN 9789819998357
    Additional Edition: Printed edition: ISBN 9789819998371
    Additional Edition: Printed edition: ISBN 9789819998388
    Language: English
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    almahu_9947917154402882
    Format: XIII, 310 p. 54 illus. , online resource.
    ISBN: 9783319737065
    Series Statement: Lecture Notes in Computer Science, 10713
    Content: This open access volume constitutes the refereed proceedings of the 27th biennial conference of the German Society for Computational Linguistics and Language Technology, GSCL 2017, held in Berlin, Germany, in September 2017, which focused on language technologies for the digital age. The 16 full papers and 10 short papers included in the proceedings were carefully selected from 36 submissions. Topics covered include text processing of the German language, online media and online content, semantics and reasoning, sentiment analysis, and semantic web description languages.
    Note: Reconstruction of Separable Particle Verbs in a Corpus of Spoken German -- Detecting Vocal Irony -- The Devil is in the Details: Parsing Unknown German Words -- Exploring Ensemble Dependency Parsing to Reduce Manual Annotation Workload -- Different German and English Co-reference Resolution Models for Multi-Domain Content Curation Scenarios -- Word and Sentence Segmentation in German: Overcoming Idiosyncrasies in the Use of Punctuation in Private Communication -- Fine-Grained POS Tagging of German Social Media and Web Texts -- Developing a Stemmer for German Based on a Comparative Analysis of Publicly Available Stemmers -- Negation Modeling for German Polarity Classification -- NECKAr: A Named Entity Classifier for Wikidata -- Investigating the Morphological Complexity of German Named Entities: The Case of the GermEval NER Challenge -- Detecting Named Entities and Relations in German Clinical Reports -- In-Memory Distributed Training of Linear-Chain Conditional Random Fields with an Application to Fine-Grained Named Entity Recognition -- What does this imply? Examining the Impact of Implicitness on the Perception of Hate Speech -- Automatic Classification of Abusive Language and Personal Attacks in Various Forms of Online Communication -- Token Level Code-Switching Detection Using Wikipedia as a Lexical Resource -- How Social Media Text Analysis Can Inform Disaster Management -- A Comparative Study of Uncertainty Based Active Learning Strategies for General Purpose Twitter Sentiment Analysis with Deep Neural Networks -- An Infrastructure for Empowering Internet Users to Handle Fake News and Other Online Media Phenomena -- Different Types of Automated and Semi-automated Semantic Storytelling: Curation Technologies for Different Sectors -- Twitter Geolocation Prediction Using Neural Networks -- Diachronic Variation of Temporal Expressions in Scientific Writing Through the Lens of Relative Entropy -- A Case Study on the Relevance of the Competence Assumption for Implicature Calculation in Dialogue Systems -- Supporting Sustainable Process Documentation -- Optimizing Visual Representations in Semantic Multi-Modal Models with Dimensionality Reduction, De-noising and Contextual Information -- Using Argumentative Structure to Grade Persuasive Essays.
    In: Springer eBooks
    Additional Edition: Printed edition: ISBN 9783319737058
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Konferenzschrift
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    UID:
    almafu_BV005072558
    Format: 848 S.
    Note: Literaurverz. S. 847 - 848
    Later: 2. Aufl. u.d.T. Clason, Willem Elbertus Elsevier's dictionary of computers, automatic control, and data processing
    Language: German
    Subjects: Economics
    RVK:
    Keywords: Automation ; Englisch ; Französisch ; Spanisch ; Italienisch ; Niederländisch ; Mehrsprachiges Wörterbuch ; Wörterbuch ; Mehrsprachiges Wörterbuch ; Wörterbuch ; Mehrsprachiges Wörterbuch ; Wörterbuch
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Cham :Springer International Publishing AG,
    UID:
    almahu_9949602164202882
    Format: 1 online resource (192 pages)
    Edition: 1st ed.
    ISBN: 9783319785035
    Note: Intro -- Preface -- Objectives -- Organisation of Book Chapters -- Intended Readers -- Limitations -- Book Project During Sabbatical Stay in Sydney -- Aims -- Acknowledgements -- Contents -- 1 Introduction -- 1.1 Early Work and Review Articles -- 2 The History of the Patient Record and the Paper Record -- 2.1 The Egyptians and the Greeks -- 2.2 The Arabs -- 2.3 The Swedes -- 2.4 The Paper Based Patient Record -- 2.5 Greek and Latin Used in the Patient Record -- 2.6 Summary of the History of the Patient Record and the Paper Record -- 3 User Needs: Clinicians, Clinical Researchers and Hospital Management -- 3.1 Reading and Retrieving Efficiency of Patient Records -- 3.2 Natural Language Processing on Clinical Text -- 3.3 Electronic Patient Record System -- 3.4 Different User Groups -- 3.5 Summary -- 4 Characteristics of Patient Records and Clinical Corpora -- 4.1 Patient Records -- 4.2 Pathology Reports -- 4.3 Spelling Errors in Clinical Text -- 4.4 Abbreviations -- 4.5 Acronyms -- 4.6 Assertions -- 4.6.1 Negations -- 4.6.2 Speculation and Factuality -- Levels of Certainty -- Negation and Speculations in Other Languages, Such as Chinese -- 4.7 Clinical Corpora Available -- 4.7.1 English Clinical Corpora Available -- 4.7.2 Swedish Clinical Corpora -- 4.7.3 Clinical Corpora in Other Languages than Swedish -- 4.8 Summary -- 5 Medical Classifications and Terminologies -- 5.1 International Statistical Classification of Diseases and Related Health Problems (ICD) -- 5.1.1 International Classification of Diseases for Oncology (ICD-O-3) -- 5.2 Systematized Nomenclature of Medicine: Clinical Terms (SNOMED CT) -- 5.3 Medical Subject Headings (MeSH) -- 5.4 Unified Medical Language Systems (UMLS) -- 5.5 Anatomical Therapeutic Chemical Classification (ATC) -- 5.6 Different Standards for Interoperability -- 5.6.1 Health Level 7 (HL7). , Fast Healthcare Interoperability Resources (FHIR) -- 5.6.2 OpenEHR -- 5.6.3 Mapping and Expanding Terminologies -- 5.7 Summary of Medical Classifications and Terminologies -- 6 Evaluation Metrics and Evaluation -- 6.1 Qualitative and Quantitative Evaluation -- 6.2 The Cranfield Paradigm -- 6.3 Metrics -- 6.4 Annotation -- 6.5 Inter-Annotator Agreement (IAA) -- 6.6 Confidence and Statistical Significance Testing -- 6.7 Annotation Tools -- 6.8 Gold Standard -- 6.9 Summary of Evaluation Metrics and Annotation -- 7 Basic Building Blocks for Clinical Text Processing -- 7.1 Definitions -- 7.2 Segmentation and Tokenisation -- 7.3 Morphological Processing -- 7.3.1 Lemmatisation -- 7.3.2 Stemming -- 7.3.3 Compound Splitting (Decompounding) -- 7.3.4 Abbreviation Detection and Expansion -- A Machine Learning Approach for Abbreviation Detection -- 7.3.5 Spell Checking and Spelling Error Correction -- Spell Checking of Clinical Text -- Open Source Spell Checkers -- Search Engines and Spell Checking -- 7.3.6 Part-of-Speech Tagging (POS Tagging) -- 7.4 Syntactical Analysis -- 7.4.1 Shallow Parsing (Chunking) -- 7.4.2 Grammar Tools -- 7.5 Semantic Analysis and Concept Extraction -- 7.5.1 Named Entity Recognition -- Machine Learning for Named Entity Recognition -- 7.5.2 Negation Detection -- Negation Detection Systems -- Negation Trigger Lists -- NegEx for Swedish -- NegEx for French, Spanish and German -- Machine Learning Approaches for Negation Detection -- 7.5.3 Factuality Detection -- 7.5.4 Relative Processing (Family History) -- 7.5.5 Temporal Processing -- TimeML and TIMEX3 -- HeidelTime -- i2b2 Temporal Relations Challenge -- Temporal Processing for Swedish Clinical Text -- Temporal Processing for French Clinical Text -- Temporal Processing for Portuguese Clinical Text -- 7.5.6 Relation Extraction -- 2010 i2b2/VA Challenge Relation Classification Task. , Other Approaches for Relation Extraction -- 7.5.7 Anaphora Resolution -- i2b2 Challenge in Coreference Resolution for Electronic Medical Records -- 7.6 Summary of Basic Building Blocks for Clinical Text Processing -- 8 Computational Methods for Text Analysis and Text Classification -- 8.1 Rule-Based Methods -- 8.1.1 Regular Expressions -- 8.2 Machine Learning-Based Methods -- 8.2.1 Features and Feature Selection -- Term Frequency-Inverse Document Frequency, tf-idf -- Vector Space Model -- 8.2.2 Active Learning -- 8.2.3 Pre-Annotation with Revision or Machine Assisted Annotation -- 8.2.4 Clustering -- 8.2.5 Topic Modelling -- 8.2.6 Distributional Semantics -- 8.2.7 Association Rules -- 8.3 Explaining and Understanding the Results Produced -- 8.4 Computational Linguistic Modules for Clinical Text Processing -- 8.5 NLP Tools: UIMA, GATE, NLTK etc -- 8.6 Summary of Computational Methods for Text Analysis and Text Classification -- 9 Ethics and Privacy of Patient Records for Clinical Text Mining Research -- 9.1 Ethical Permission -- 9.2 Social Security Number -- 9.3 Safe Storage -- 9.4 Automatic De-Identification of Patient Records -- 9.4.1 Density of PHI in Electronic Patient Record Text -- 9.4.2 Pseudonymisation of Electronic Patient Records -- 9.4.3 Re-Identification and Privacy -- Black Box Approach -- 9.5 Summary of Ethics and Privacy of Patient Records for Clinical Text Mining Research -- 10 Applications of Clinical Text Mining -- 10.1 Detection and Prediction of Healthcare Associated Infections (HAIs) -- 10.1.1 Healthcare Associated Infections (HAIs) -- 10.1.2 Detecting and Predicting HAI -- 10.1.3 Commercial HAI Surveillance Systems and Systems in Practical Use -- 10.2 Detection of Adverse Drug Events (ADEs) -- 10.2.1 Adverse Drug Events (ADEs) -- 10.2.2 Resources for Adverse Drug Event Detection -- 10.2.3 Passive Surveillance of ADEs. , 10.2.4 Active Surveillance of ADEs -- 10.2.5 Approaches for ADE Detection -- An Approach for Swedish Clinical Text -- An Approach for Spanish Clinical Text -- A Joint Approach for Spanish and Swedish Clinical Text -- 10.3 Suicide Prevention by Mining Electronic Patient Records -- 10.4 Mining Pathology Reports for Diagnostic Tests -- 10.4.1 The Case of the Cancer Registry of Norway -- 10.4.2 The Medical Text Extraction (Medtex) System -- 10.5 Mining for Cancer Symptoms -- 10.6 Text Summarisation and Translation of Patient Record -- 10.6.1 Summarising the Patient Record -- 10.6.2 Other Approaches in Summarising the Patient Record -- 10.6.3 Summarising Medical Scientific Text -- 10.6.4 Simplification of the Patient Record for Laypeople -- 10.7 ICD-10 Diagnosis Code Assignment and Validation -- 10.7.1 Natural Language Generation from SNOMED CT -- 10.8 Search Cohort Selection and Similar Patient Cases -- 10.8.1 Comorbidities -- 10.8.2 Information Retrieval from Electronic Patient Records -- 10.8.3 Search Engine Solr -- 10.8.4 Supporting the Clinician in an Emergency Department with the Radiology Report -- 10.8.5 Incident Reporting -- 10.8.6 Hypothesis Generation -- 10.8.7 Practical Use of SNOMED CT -- 10.8.8 ICD-10 and SNOMED CT Code Mapping -- 10.8.9 Analysing the Patient's Speech -- 10.8.10 MYCIN and Clinical Decision Support -- 10.8.11 IBM Watson Health -- 10.9 Summary of Applications of Clinical Text Mining -- 11 Networks and Shared Tasks in Clinical Text Mining -- 11.1 Conferences, Workshops and Journals -- 11.2 Summary of Networks and Shared Tasks in Clinical Text Mining -- 12 Conclusions and Outlook -- 12.1 Outcomes -- References -- Index.
    Additional Edition: Print version: Dalianis, Hercules Clinical Text Mining Cham : Springer International Publishing AG,c2018 ISBN 9783319785028
    Language: English
    Keywords: Electronic books. ; Electronic books
    URL: Image  (Thumbnail cover image)
    URL: Image  (Thumbnail cover image)
    URL: OAPEN  (Creative Commons License)
    URL: OAPEN
    URL: OAPEN
    URL: Full-text  ((OIS Credentials Required))
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Book
    Book
    New York :American Elsevier,
    UID:
    almafu_BV004159429
    Format: VIII, 122 S.
    Series Statement: Mathematical linguistics and automatic language processing 7
    Language: English
    Subjects: Comparative Studies. Non-European Languages/Literatures
    RVK:
    Keywords: Syntax
    Author information: Sgall, Petr 1926-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    UID:
    almahu_9947920858402882
    Format: VII, 314 p. , online resource.
    ISBN: 9783540398752
    Series Statement: Lecture Notes in Computer Science, 232
    Content: This volume contains the elaborated and harmonized versions of seven lectures given at the first Advanced Course in Artificial Intelligence, held in Vignieu, France, in July 1985. Most of them were written in tutorial form; the book thus provides an extremely valuable guide to the fundamental aspects of AI. In the first part, Delgrande and Mylopoulos discuss the concept of knowledge and its representation. The second part is devoted to the processing of knowledge. The contribution by Huet shows that both computation and inference or deduction are just different aspects of the same phenomenon. The chapter written by Stickel gives a thorough and knowledgeable introduction to the most important aspects of deduction by some form of resolution. The kind of reasoning that is involved in inductive inference problem solving (or programming) from examples, and in learning, is covered by Biermann. The tutorial by Bibel covers the more important forms of knowledge processing that might play a significant role in common sense reasoning. The third part of the book focuses on logic programming and functional programming. Jorrand presents the language FP2, where term rewriting forms the basis for the semantics of both functional and parallel programming. In the last chapter, Shapiro gives an overview of the current state of concurrent PROLOG.
    Note: Knowledge representation: Features of knowledge -- Deduction and computation -- An introduction to automated deduction -- Fundamental mechanisms in machine learning and inductive inference -- Methods of automated reasoning -- Term rewriting as a basis for the design of a functional and parallel programming language -- Concurrent Prolog: A progress report.
    In: Springer eBooks
    Additional Edition: Printed edition: ISBN 9783540167822
    Language: English
    Subjects: Computer Science , Comparative Studies. Non-European Languages/Literatures
    RVK:
    RVK:
    Keywords: Aufsatzsammlung ; Konferenzschrift
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages