Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
April 18, 2024

Building a data culture: the usage and flow data culture model
Building a data culture provides an introduction to the concepts of organizational culture and data culture. It emphasizes that, for an organization’s strategy to succeed, there must be alignment between the strategy and the prevailing organizational culture. This idea is... more
You have riches and freedom here but I feel no sense of faith or direction. You have so many computers, why don’t you use them in the search for love?... more
- Lech Walesa (1988)
Industry 5.0 and its technologies: a systematic literature review upon the human place into IoT- and CPS-based industrial systems: Computers and Industrial Engineering

The emergence of Industry 5.0 signifies “a paradigm shift that emphasizes the integration of advanced technologies with human-centric approaches”... more

Computers In Other Systems (J.7) | Apr 18 24

Writing by hand or digitally in first grade: effects on rate of learning to compose text: Computers & Education

This paper is one outcome of the DigiHand project (2018-2022), funded by the Research Council of Norway (grant number 273422). It is divided into five sections: “Introduction,” “Method,” “Statistical Analysis,” “Results,” and “Discussion... more

Education (J.1...) | Apr 10 24

On the adaptation of recurrent neural networks for system identification: Automatica

In this pape, Forgione et al. propose a transfer learning methodology to adapt recurrent neural network (RNN) models for dynamic system identification to new operating conditions. The approach is premised on the concept that the dynamics of real-world... more

Neural Nets (C.1.3...) | Apr 9 24

Machine learning in industrial control system (ICS) security: current landscape, opportunities and challenges: Journal of Intelligent Information Systems

Today, machine learning is applied to threat detection and classification problems in the important field of industrial control. This paper reviews different ML papers that apply supervised learning, unsupervised... more

General (H.1.0) | Mar 18 24

Trustworthy AI: from principles to practices: ACM Computing Surveys

As computing technology continues to evolve, artificial intelligence (AI) is playing an increasing role in various aspects of our lives. Although AI dates back many decades--I took an AI subject in my university studies, in 1988--only... more

General (I.2.0) | Mar 12 24

Data-driven prototyping via natural-language-based GUI retrieval: Automated Software Engineering

Reading this paper would leave anyone conflicted. It describes a good contribution ridden with flaws. It is puzzling that the referees and journal editors accepted the paper in its current form. The presentation... more

Software Development (K.6.3...) | Mar 7 24

10 things software developers should learn about learning: Communications of the ACM

As software developers, we understand the detailed workings of the different components of our computer systems. And--probably due to how computers were presented since their appearance as “digital... more

Software Development (K.6.3...) | Feb 22 24

Conversational artificial intelligence in the AEC industry: a review of present status, challenges and opportunities: Advanced Engineering Informatics

Those working in the architecture, engineering, and construction (AEC) domain often get bogged down in day-to-day paperwork and verbally communicated instructions. Natural... more

General (I.2.0) | Feb 14 24

State-of-the-art improvements and applications of position based dynamics: Computer Animation and Virtual Worlds

The physically plausible simulation of objects is an active area of research in computer graphics. It is used in movies and video games and to simulate phenomena that would be expensive to do in a laboratory. In the traditional simulation method, external and... more

Animation (I.3.7...) | Feb 12 24

A survey of cyber security threats and solutions for UAV communications and flying ad-hoc networks: Ad Hoc Networks

FANET was coined for flying ad hoc networks, for example, unmanned aerial vehicles (UAVs). This survey paper is an in-depth discussion of the cybersecurity concerns and shortcomings unique to UAVs, as... more

Security & Protection (C.2.0...) | Feb 8 24

Artificial intelligence in business management

As artificial intelligence (AI) gains momentum there are both growing concerns such as deepfakes and advantages such as the high availability of virtual agents, consistent results, increased productivity, and so on. AI programs imitate human cognitive skills that include... more
Artificial Intelligence (I.2) | Apr 17 24

Coding art: a guide to unlocking your creativity with the Processing language and p5.js in four simple steps

Design thinking may be considered as a set of important constructive processes and precepts used in the design and launch of products and solutions to human design problems. Coding art, now in its second edition, is published as part of the Apress “Design... more
Arts & Humanities (J.5) | Apr 15 24

Living computers

Living computers is simultaneously philosophical and scientific. Brazma begins with the following claim: “Life and the recording of information emerged together; there is no life without information and, arguably, there is no information without life.” Throughout the... more
Biology & Genetics (J.3...) | Apr 12 24

Fashion tech applied: exploring augmented reality, artificial intelligence, virtual reality, NFTs, body scanning, 3D digital design, and more

In the ever-evolving fashion landscape, technology plays a pivotal role in shaping the industry’s future. This book delves into the intersection of fashion and cutting-edge technology, offering enlightening and practical... more
Computer-Aided Design (CAD) (J.6...) | Apr 11 24

Information is energy: definition of a physically based concept of information

Shannon’s theory of information is one of the cornerstones of modern computer science (CS). The formalism he developed for quantifying channel capacity was previously known from statistical thermodynamics as entropy, and the significance of this formal... more
Information Theory (H.1.1...) | Apr 8 24

Building a data culture: the usage and flow data culture model

Building a data culture provides an introduction to the concepts of organizational culture and data culture. It emphasizes that, for an organization’s strategy to succeed, there must be alignment between the strategy and the prevailing organizational culture. This... more
General (K.6.0) | Apr 5 24

Responsible AI: best practices for creating trustworthy AI systems

Responsible AI: best practices for creating trustworthy AI systems is an in-depth book that explores the essential elements of artificial intelligence (AI) systems, emphasizing ethics, transparency, and responsibility. The book is intricately organized, offering a clear... more
General (I.2.0) | Apr 4 24

Information security planning: a practical approach (2nd ed.)

Information security planning presents a comprehensive guide to the basics of information security planning. The author’s perspective addresses critical issues and challenges for emerging information security, including security awareness, strategic/tactical security... more
Security & Protection (K.6.5) | Apr 3 24

Visual complex analysis (25th anniversary ed.)

Complex analysis has always enhanced the learning of mathematics. The application of complex numbers in other fields has also been widely studied, independent of theoretical studies in mathematics and related subjects. This book looks at the geometrical aspects of... more
General (G.0) | Apr 1 24

Machine learning safety

Machine learning safety delves into the growing field of verification, robustness, training against adversarial attacks, privacy enhancement, and other safety concerns in the context of deep learning (DL) and deep reinforcement learning (DRL). The authors have... more
Probability & Statistics (G.3) | Mar 29 24

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy