<div><p style="margin: 0px 0px 14px; padding: 0px; font-variant-ligatures: normal;"><b>Develop real-world applications powered by the latest advances in intelligent systems</b></p><h4 style="margin: 0px; padding: 0px 0px 4px; text-rendering: optimizelegibility; font-variant-ligatures: normal;">Key F
A Beginner’s Guide to Informatics and Artificial Intelligence
✍ Scribed by Wei Weng
- Publisher
- Springer
- Year
- 2024
- Tongue
- English
- Leaves
- 136
- Category
- Library
No coin nor oath required. For personal study only.
✦ Synopsis
Embark on a transformative learning journey with this book, a concise and engaging short course for those taking their first steps into the realms of information science and AI. Ideal for undergraduates, graduates, and professionals, this book lays a sturdy foundation upon which readers can build whether their aim is to undertake research projects, pursue a career in technology, or simply understand the workings of the digital age.
The learning objectives are
* Foundational understanding: Build a sturdy foundation by introducing basic concepts and gradually progressing to advanced topics.
* Practical problem-solving: Foster the ability to solve real-world problems through guided exercises and application-oriented learning.
* Holistic knowledge: Provide a holistic understanding of information science and AI, empowering learners to contribute meaningfully to the future of these disciplines.
The key features are
* Comprehensive coverage: Explore computer science basics to advanced AI techniques for a holistic understanding of the field.
* Engaging writing style: Complex concepts made approachable for beginners without sacrificing depth.* Bridging theory with application: Real-world scenarios illustrate and encourage practical applications.
* Practical exercises: Guided hands-on exercises develop problem-solving skills, ensuring a practical understanding of the material.
✦ Table of Contents
Preface
Background and Purpose
Topics and Organization of Contents
Features of this Book
How to Use this Book
Acknowledgements
Contents
List of Figures
List of Tables
1 Computer
1.1 What is a Computer
1.2 Program and Programming
1.3 Distinguishing Characteristic of a Computer
1.4 Composition of a Computer
1.5 Hardware and Software of a Computer
1.6 Representation of Information Inside a Computer
1.7 Computing Mechanism of a Computer
References
2 Flowchart
2.1 What is a Flowchart
2.2 How to Create a Flowchart
2.3 Notes on Flowcharting
2.4 Clarify the Meaning of Each Statement
Reference
3 Time Complexity
3.1 What is Time Complexity
3.2 How to Know Time Complexity from a Flowchart
3.3 Significance of Time Complexity
3.4 How to Evaluate a Program
References
4 Artificial Intelligence—Mathematical Modeling
4.1 What is Artificial Intelligence
4.2 Target Problems of AI Optimization Methods
4.3 Mathematical Modeling of a Problem
4.3.1 Single Machine Scheduling Problem
4.3.2 Knapsack Problem
4.4 Encoding
References
5 Artificial Intelligence—Genetic Algorithm
5.1 What is Genetic Algorithm
5.2 Flowchart of Genetic Algorithm
5.3 How to Use GA to Solve a Problem
5.3.1 Initial Population Creation
5.3.2 Evaluation
5.3.3 Selection
5.3.4 Crossover
5.3.5 Mutation
5.3.6 Termination Criterion
References
6 Artificial Intelligence—Machine Learning
6.1 What is Machine Learning
6.2 Types of Machine Learning
6.3 Neural Network
6.3.1 What is a Neural Network
6.3.2 Threshold Logic Unit (TLU)
6.3.3 Learning of TLU
6.3.4 Deep Learning
References
7 Network
7.1 What is a Network
7.2 Methods of Switching
7.3 Network Topologies
7.4 Physical Configuration
7.4.1 Wired LAN (Ethernet)
7.4.2 Wireless LAN (Wi-Fi)
7.5 Internet
7.5.1 Internet Protocols
7.5.2 IP Address
7.5.3 Domain Name
7.6 Various Information Systems
References
8 Database
8.1 What is a Database
8.2 Relational Database
8.2.1 Union
8.2.2 Difference
8.2.3 Intersection
8.2.4 Restriction
8.2.5 Projection
References
9 Information Security
9.1 What is Information Security
9.2 Risks, Threats, and Vulnerabilities
9.3 Security Measures for Users
9.3.1 Management of User IDs and Passwords
9.3.2 Anti-virus Measures
9.4 Security Measures for Administrators
9.4.1 Create Information Security Policy
9.4.2 Access Management
9.4.3 Firewall
9.5 Security Technologies
9.5.1 Encryption
9.5.2 Digital Signature and Digital Authentication
9.5.3 Secure Encrypted Communication
References
10 Solutions to Exercises
10.1 Chapter 1 Solutions and Answers
10.2 Chapter 2 Solutions and Answers
10.3 Chapter 3 Solutions and Answers
10.4 Chapter 4 Solutions and Answers
10.5 Chapter 5 Solutions and Answers
10.6 Chapter 6 Solutions and Answers
10.7 Chapter 7 Solutions and Answers
10.8 Chapter 8 Solutions and Answers
10.9 Chapter 9 Solutions and Answers
📜 SIMILAR VOLUMES
<p><span>This book reimagines education in today’s Artificial Intelligence (AI) world and the Fourth Industrial Revolution. Artificial intelligence will drastically affect every industry and sector, and education is no exception. This book aims at how AI may impact the teaching and learning process
This book reimagines education in today’s Artificial Intelligence (AI) world and the Fourth Industrial Revolution. Artificial intelligence will drastically affect every industry and sector, and education is no exception. This book aims at how AI may impact the teaching and learning process in educat
This Learning Path offers practical knowledge and techniques you need to create and contribute to machine learning, deep learning, and modern data analysis. You will be introduced to various machine learning and deep learning algorithms from scratch, and show you how to apply them to practical indus