Machine learning and data analytics are powering a wave of groundbreaking technologies. Is your company ready? If you read nothing else on how intelligent machines are revolutionizing business, read these 10 articles. We´ve combed through hundreds of Harvard Business Review articles and selected the most important ones to help you understand how these technologies work together, how to adopt them, and why your strategy can´t ignore them. In this book you´ll learn how: Data science, driven by artificial intelligence and machine learning, is yielding unprecedented business insightsBlockchain has the potential to restructure the economyDrones and driverless vehicles are becoming essential tools3-D printing is making new business models possibleAugmented reality is transforming retail and manufacturingSmart speakers are redefining the rules of marketingHumans and machines are working together to reach new levels of productivity This collection of articles includes ´´Artificial Intelligence for the Real World,´´ by Thomas H. Davenport and Rajeev Ronanki; ´´Stitch Fix´s CEO on Selling Personal Style to the Mass Market,´´ by Katrina Lake; ´´Algorithms Need Managers, Too,´´ by Michael Luca, Jon Kleinberg, and Sendhil Mullainathan; ´´Marketing in the Age of Alexa,´´ by Niraj Dawar; ´´Why Every Organization Needs an Augmented Reality Strategy,´´ by Michael E. Porter and James E. Heppelmann; ´´Drones Go to Work,´´ by Chris Anderson; ´´The Truth About Blockchain,´´ by Marco Iansiti and Karim R. Lakhani; ´´The 3-D Printing Playbook,´´ by Richard A. D´Aveni; ´´Collaborative Intelligence: Humans and AI Are Joining Forces,´´ by H. James Wilson and Paul R. Daugherty; ´´When Your Boss Wears Metal Pants,´´ by Walter Frick; and ´´Managing Our Hub Economy,´´ by Marco Iansiti and Karim R. Lakhani.
Andreas Meier und Edy Portmann verwenden in diesem essential über Fuzzy Management die unscharfe Logik zur Lösung betriebswirtschaftlicher Probleme in der digitalen Wirtschaft. Die unscharfe Logik erweitert die klassische Logik mit den beiden Werten ´´wahr´´ und ´´falsch´´ und führt zu differenzierteren Beurteilungen. Neben Portfolio Management, Performance Measurement, Service Level Engineering und Reputationsmanagement wird die Business Intelligence mit weichen Faktoren angereichert, um den Entscheidungsprozess zu verbessern. Die Autoren: Prof. Dr. Andreas Meier leitete in den Jahren 1999 bis 2018 den Lehrstuhl für Wirtschaftsinformatik an der Universität Fribourg, Schweiz. Seine Forschungsgebiete waren eBusiness, eGovernment und Informationsmanagement. Prof. Dr. Edy Portmann ist Swiss Post Professor of Computer Science am Human-IST Institut der Universität Fribourg, Schweiz. In seiner Forschung beschäftigt er sich mit Fragen rund um Informationssysteme, -verarbeitung und -beschaffung.
This book contains the revised selected papers of 4 workshops held in conjunction with the International Conference on High Performance Computing, Networking, Storage and Analysis (SC) in November 2017 in Denver, CO, USA, and in November 2018 in Dallas, TX, USA: the 6th and 7th International Workshop on Extreme-Scale Programming Tools, ESPT 2017 and ESPT 2018, and the 4th and 5th International Workshop on Visual Performance Analysis, VPA 2017 and VPA 2018. The 11 full papers of ESPT 2017 and ESPT 2018 and the 6 full papers of VPA 2017 and VPA 2018 were carefully reviewed and selected for inclusion in this book. The papers discuss the requirements for exascale-enabled tools as well as new approaches of applying visualization and visual analytic techniques to large-scale applications. Topics of interest include: programming tools; methodologies for performance engineering; tool technologies for extreme-scale challenges (e.g., scalability, resilience, power); tool support for accelerated architectures and large-scale multi-cores; tool infrastructures and environments; evolving/future application requirements for programming tools and technologies; application developer experiences with programming and performance tools; scalable displays of performance data; case studies demonstrating the use of performance visualization in practice; data models to enable scalable visualization; graph representation of unstructured performance data; presentation of high-dimensional data; visual correlations between multiple data sources; human-computer interfaces for exploring performance data; and multi-scale representations of performance data for visual exploration.
This book constitutes revised selected papers from the 6th International Conference on Robot Intelligence Technology and Applications, RiTA 2018, held in Putrajaya, Malaysia, in December 2018. The 20 full papers presented in this volume were carefully reviewed and selected from 80 submissions. The papers present studies on machine learning; optimization; modelling and simulation; path planning; neural networks; landmark recognition; and reinforcement learning.
Eine minimalinvasive Operation stellt den Chirurgen besondere Herausforderungen vor: Die Handhabung der langen Instrumente, die in der Laparoskopie zum Einsatz kommen, ist ungewohnt und unintuitiv. Zudem wird vom Operateur genauste Arbeit auf engem Raum verlangt. Um angehenden Medizinern das Erlernen der nötigen Fähigkeiten zu ermöglichen, entwickelt das Institut für Antropomatik und Robotik in Zusammenarbeit mit Medizinern der Uni Heidelberg ein semivirtuelles Trainingssystem, an dem Medizinstudenten das Knüpfen von Knoten während einer minimalinvasiven Operation üben können.
This book is about a new approach in the field of computational linguistics related to the idea of constructing n-grams in non-linear manner, while the traditional approach consists in using the data from the surface structure of texts, i.e., the linear structure. In this book, we propose and systematize the concept of syntactic n-grams, which allows using syntactic information within the automatic text processing methods related to classification or clustering. It is a very interesting example of application of linguistic information in the automatic (computational) methods. Roughly speaking, the suggestion is to follow syntactic trees and construct n-grams based on paths in these trees. There are several types of non-linear n-grams; future work should determine, which types of n-grams are more useful in which natural language processing (NLP) tasks. This book is intended for specialists in the field of computational linguistics. However, we made an effort to explain in a clear manner how to use n-grams; we provide a large number of examples, and therefore we believe that the book is also useful for graduate students who already have some previous background in the field.
A substance used in the diagnosis, treatment, or prevention of a disease or as a component of a medication. Such a substance as recognized or defined by the U.S. Food, Drug, and Cosmetic act´´. Drugs are generally defined as molecules which affect biological processes. In order to be effective, the molecule must be present in the body at an adequate concentration for it to act at the specific site in the body where it can exert its effect. Additionally, the molecule must be safe that is, metabolized and eliminated from the body without causing injury. A drug, broadly speaking, is any substance that, when absorbed into the body of a living organism, alters normal bodily function. There is no single, precise definition, as there are different meanings in drug control law, government regulations, medicine, and colloquial usage. In pharmacology, a drug is ´´a chemical substance used in the treatment, cure, prevention, or diagnosis of disease or used to otherwise enhance physical or mental well-being.´´ Drugs may be prescribed for a limited duration, or on a regular basis for chronic disorders.
The three volume-set LNCS 11476, 11477, and 11478 constitute the thoroughly refereed proceedings of the 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2019,held in Darmstadt, Germany, in May 2019. The 76 full papers presented were carefully reviewed and selected from 327 submissions. The papers are organized into the following topical sections: ABE and CCA security; succinct arguments and secure messaging; obfuscation; block ciphers; differential privacy; bounds for symmetric cryptography; non-malleability; blockchain and consensus; homomorphic primitives; standards; searchable encryption and ORAM; proofs of work and space; secure computation; quantum, secure computation and NIZK, lattice-based cryptography; foundations; efficient secure computation; signatures; information-theoretic cryptography; and cryptanalysis.