0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (9)
  • R250 - R500 (62)
  • R500+ (5,646)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer programming > Algorithms & procedures

Recommender Systems - Algorithms and Applications (Hardcover): S. Vairachilai, Sirisha Potluri, P. Pavan Kumar, Sachi Nandan... Recommender Systems - Algorithms and Applications (Hardcover)
S. Vairachilai, Sirisha Potluri, P. Pavan Kumar, Sachi Nandan Mohanty
R3,124 Discovery Miles 31 240 Ships in 12 - 17 working days

Recommender systems use information filtering to predict user preferences. They are becoming a vital part of e-business and are used in a wide variety of industries, ranging from entertainment and social networking to information technology, tourism, education, agriculture, healthcare, manufacturing, and retail. Recommender Systems: Algorithms and Applications dives into the theoretical underpinnings of these systems and looks at how this theory is applied and implemented in actual systems. The book examines several classes of recommendation algorithms, including Machine learning algorithms Community detection algorithms Filtering algorithms Various efficient and robust product recommender systems using machine learning algorithms are helpful in filtering and exploring unseen data by users for better prediction and extrapolation of decisions. These are providing a wider range of solutions to such challenges as imbalanced data set problems, cold-start problems, and long tail problems. This book also looks at fundamental ontological positions that form the foundations of recommender systems and explain why certain recommendations are predicted over others. Techniques and approaches for developing recommender systems are also investigated. These can help with implementing algorithms as systems and include A latent-factor technique for model-based filtering systems Collaborative filtering approaches Content-based approaches Finally, this book examines actual systems for social networking, recommending consumer products, and predicting risk in software engineering projects.

Techniques for Designing and Analyzing Algorithms (Hardcover): Douglas R. Stinson Techniques for Designing and Analyzing Algorithms (Hardcover)
Douglas R. Stinson
R2,680 Discovery Miles 26 800 Ships in 12 - 17 working days

Techniques for Designing and Analyzing Algorithms Design and analysis of algorithms can be a difficult subject for students due to its sometimes-abstract nature and its use of a wide variety of mathematical tools. Here the author, an experienced and successful textbook writer, makes the subject as straightforward as possible in an up-to-date textbook incorporating various new developments appropriate for an introductory course. This text presents the main techniques of algorithm design, namely, divide-and-conquer algorithms, greedy algorithms, dynamic programming algorithms, and backtracking. Graph algorithms are studied in detail, and a careful treatment of the theory of NP-completeness is presented. In addition, the text includes useful introductory material on mathematical background including order notation, algorithm analysis and reductions, and basic data structures. This will serve as a useful review and reference for students who have covered this material in a previous course. Features The first three chapters provide a mathematical review, basic algorithm analysis, and data structures Detailed pseudocode descriptions of the algorithms along with illustrative algorithms are included Proofs of correctness of algorithms are included when appropriate The book presents a suitable amount of mathematical rigor After reading and understanding the material in this book, students will be able to apply the basic design principles to various real-world problems that they may encounter in their future professional careers.

IP Routing Protocols - Link-State and Path-Vector Routing Protocols (Hardcover): James Aweya IP Routing Protocols - Link-State and Path-Vector Routing Protocols (Hardcover)
James Aweya
R5,204 Discovery Miles 52 040 Ships in 12 - 17 working days

This book discusses link-state routing protocols (OSPF and IS-IS), and the path-vector routing protocol (BGP). It covers their most identifying characteristics, operations, and the databases they maintain. Material is presented from a practicing engineer's perspective, linking theory and fundamental concepts to common practices and real-world examples. Every aspect of the book is written to reflect current best practices using real-world examples. The book begins with a detailed description of the OSPF area types and hierarchical routing, and the different types of routers used in an OSPF autonomous system. The author goes on to describe in detail the different OSPF packet types, and inbound and outbound processing of OSPF link-state advertisements (LSAs). Next, the book gives an overview of the main features of IS-IS. The author then discusses the two-level routing hierarchy for controlling the distribution of intra-domain (Level 1) and inter-domain (Level 2) routing information within an IS-IS routing domain. He then describes in detail IS-IS network address formats, IS-IS routing metrics, IS-IS packet types, IS-IS network types and adjacency formation, IS-IS LSDB and synchronization, and IS-IS authentication. The book then reviews the main concepts of path-vector routing protocols, and describes BGP packet types, BGP session states and Finite State Machine, BGP path attributes types, and BGP Autonomous System Numbers (ASNs). Focuses solely on link-state routing protocols (OSPF and IS-IS), and the only path-vector routing protocol in use today (BGP). Reviews the basic concepts underlying the design of IS-IS and provides a detailed description of IS-IS area types and hierarchical routing, and the different types of routers used by IS-IS. Discusses the two-level routing hierarchy for controlling the distribution of intra-domain (Level 1) and inter-domain (Level 2) routing information within an IS-IS routing domain. Describes in detail BGP packet types, BGP session states and Finite State Machine, BGP path attributes types, and BGP ASNs, includes a high-level view of the typical BGP router and its components, and inbound and outbound message processing. James Aweya, PhD, is a chief research scientist at the Etisalat British Telecom Innovation Center (EBTIC), Khalifa University, Abu Dhabi, UAE. He has authored four books including this book and is a senior member of the Institute of Electrical and Electronics Engineers (IEEE).

IP Routing Protocols - Fundamentals and Distance-Vector Routing Protocols (Hardcover): James Aweya IP Routing Protocols - Fundamentals and Distance-Vector Routing Protocols (Hardcover)
James Aweya
R5,191 Discovery Miles 51 910 Ships in 12 - 17 working days

This book focuses on the fundamental concepts of IP routing and distance-vector routing protocols (RIPv2 and EIGRP). It discusses routing protocols from a practicing engineer's perspective, linking theory and fundamental concepts to common practices and everyday examples. The book benefits and reflects the author's more than 22 years of designing and working with IP routing devices and protocols (and Telecoms systems, in general). Every aspect of the book is written to reflect current best practices using real-world examples. This book describes the various methods used by routers to learn routing information. The author includes discussion of the characteristics of the different dynamic routing protocols, and how they differ in design and operation. He explains the processing steps involved in forwarding IP packets through an IP router to their destination and discusses the various mechanisms IP routers use for controlling routing in networks. The discussion is presented in a simple style to make it comprehensible and appealing to undergraduate and graduate level students, research and practicing engineers, scientists, IT personnel, and network engineers. It is geared toward readers who want to understand the concepts and theory of IP routing protocols, through real-world example systems and networks. Focuses on the fundamental concepts of IP routing and distance-vector routing protocols (RIPv2 and EIGRP). Describes the various methods used by routers to learn routing information. Includes discussion of the characteristics of the different dynamic routing protocols, and how they differ in design and operation. Provides detailed descriptions of the most common distance-vector routing protocols RIPv2 and EIGRP. Discusses the various mechanisms IP routers use for controlling routing in networks. James Aweya, PhD, is a chief research scientist at the Etisalat British Telecom Innovation Center (EBTIC), Khalifa University, Abu Dhabi, UAE. He has authored four books including this book and is a senior member of the Institute of Electrical and Electronics Engineers (IEEE).

Big Data, Political Campaigning and the Law - Democracy and Privacy in the Age of Micro-Targeting (Paperback): Normann Witzleb,... Big Data, Political Campaigning and the Law - Democracy and Privacy in the Age of Micro-Targeting (Paperback)
Normann Witzleb, Moira Paterson, Janice Richardson
R1,295 Discovery Miles 12 950 Ships in 12 - 17 working days

In this multidisciplinary book, experts from around the globe examine how data-driven political campaigning works, what challenges it poses for personal privacy and democracy, and how emerging practices should be regulated. The rise of big data analytics in the political process has triggered official investigations in many countries around the world, and become the subject of broad and intense debate. Political parties increasingly rely on data analytics to profile the electorate and to target specific voter groups with individualised messages based on their demographic attributes. Political micro-targeting has become a major factor in modern campaigning, because of its potential to influence opinions, to mobilise supporters and to get out votes. The book explores the legal, philosophical and political dimensions of big data analytics in the electoral process. It demonstrates that the unregulated use of big personal data for political purposes not only infringes voters' privacy rights, but also has the potential to jeopardise the future of the democratic process, and proposes reforms to address the key regulatory and ethical questions arising from the mining, use and storage of massive amounts of voter data. Providing an interdisciplinary assessment of the use and regulation of big data in the political process, this book will appeal to scholars from law, political science, political philosophy and media studies, policy makers and anyone who cares about democracy in the age of data-driven political campaigning.

Soft Computing Techniques in Engineering, Health, Mathematical and Social Sciences (Hardcover): Pradip Debnath, S. A. Mohiuddine Soft Computing Techniques in Engineering, Health, Mathematical and Social Sciences (Hardcover)
Pradip Debnath, S. A. Mohiuddine
R3,256 Discovery Miles 32 560 Ships in 12 - 17 working days

Soft computing techniques are no longer limited to the arena of computer science. The discipline has an exponentially growing demand in other branches of science and engineering and even into health and social science. This book contains theory and applications of soft computing in engineering, health, and social and applied sciences. Different soft computing techniques such as artificial neural networks, fuzzy systems, evolutionary algorithms and hybrid systems are discussed. It also contains important chapters in machine learning and clustering. This book presents a survey of the existing knowledge and also the current state of art development through original new contributions from the researchers. This book may be used as a one-stop reference book for a broad range of readers worldwide interested in soft computing. In each chapter, the preliminaries have been presented first and then the advanced discussion takes place. Learners and researchers from a wide variety of backgrounds will find several useful tools and techniques to develop their soft computing skills. This book is meant for graduate students, faculty and researchers willing to expand their knowledge in any branch of soft computing. The readers of this book will require minimum prerequisites of undergraduate studies in computation and mathematics.

Text Mining with Machine Learning - Principles and Techniques (Paperback): Jan Zizka, Frantisek Darena, Arnost Svoboda Text Mining with Machine Learning - Principles and Techniques (Paperback)
Jan Zizka, Frantisek Darena, Arnost Svoboda
R1,490 Discovery Miles 14 900 Ships in 12 - 17 working days

This book provides a perspective on the application of machine learning-based methods in knowledge discovery from natural languages texts. By analysing various data sets, conclusions which are not normally evident, emerge and can be used for various purposes and applications. The book provides explanations of principles of time-proven machine learning algorithms applied in text mining together with step-by-step demonstrations of how to reveal the semantic contents in real-world datasets using the popular R-language with its implemented machine learning algorithms. The book is not only aimed at IT specialists, but is meant for a wider audience that needs to process big sets of text documents and has basic knowledge of the subject, e.g. e-mail service providers, online shoppers, librarians, etc. The book starts with an introduction to text-based natural language data processing and its goals and problems. It focuses on machine learning, presenting various algorithms with their use and possibilities, and reviews the positives and negatives. Beginning with the initial data pre-processing, a reader can follow the steps provided in the R-language including the subsuming of various available plug-ins into the resulting software tool. A big advantage is that R also contains many libraries implementing machine learning algorithms, so a reader can concentrate on the principal target without the need to implement the details of the algorithms her- or himself. To make sense of the results, the book also provides explanations of the algorithms, which supports the final evaluation and interpretation of the results. The examples are demonstrated using realworld data from commonly accessible Internet sources.

Applied Evolutionary Algorithms for Engineers using Python (Hardcover): Leonardo Azevedo Scardua Applied Evolutionary Algorithms for Engineers using Python (Hardcover)
Leonardo Azevedo Scardua
R4,589 Discovery Miles 45 890 Ships in 12 - 17 working days

This book meant for those who seek to apply evolutionary algorithms to problems in engineering and science. To this end, it provides the theoretical background necessary to the understanding of the presented evolutionary algorithms and their shortcomings, while also discussing themes that are pivotal to the successful application of evolutionary algorithms to real-world problems. The theoretical descriptions are illustrated with didactical Python implementations of the algorithms, which not only allow readers to consolidate their understanding, but also provide a sound starting point for those intending to apply evolutionary algorithms to optimization problems in their working fields. Python has been chosen due to its widespread adoption in the Artificial Intelligence community. Those familiar with high level languages such as MATLAB (TM) will not have any difficulty in reading the Python implementations of the evolutionary algorithms provided in the book. Instead of attempting to encompass most of the existing evolutionary algorithms, past and present, the book focuses on those algorithms that researchers have recently applied to difficult optimization problems, such as control problems with continuous action spaces and the training of high-dimensional convolutional neural-networks. The basic characteristics of real-world optimization problems are presented, together with recommendations on its proper application to evolutionary algorithms. The applied nature of the book is reinforced by the presentation of successful cases of the application of evolutionary algorithms to optimization problems. This is complemented by Python source codes, giving users an insight into the idiosyncrasies of the practical application of evolutionary algorithms.

Genomic Sequence Analysis for Exon Prediction Using Adaptive Signal Processing Algorithms (Hardcover): Srinivasareddy Putluri,... Genomic Sequence Analysis for Exon Prediction Using Adaptive Signal Processing Algorithms (Hardcover)
Srinivasareddy Putluri, Md. Zia Ur Rahman
R4,133 Discovery Miles 41 330 Ships in 12 - 17 working days

This book addresses the issue of improving the accuracy in exon prediction in DNA sequences using various adaptive techniques based on different performance measures that are crucial in disease diagnosis and therapy. First, the authors present an overview of genomics engineering, structure of DNA sequence and its building blocks, genetic information flow in a cell, gene prediction along with its significance, and various types of gene prediction methods, followed by a review of literature starting with the biological background of genomic sequence analysis. Next, they cover various theoretical considerations of adaptive filtering techniques used for DNA analysis, with an introduction to adaptive filtering, properties of adaptive algorithms, and the need for development of adaptive exon predictors (AEPs) and structure of AEP used for DNA analysis. Then, they extend the approach of least mean squares (LMS) algorithm and its sign-based realizations with normalization factor for DNA analysis. They also present the normalized logarithmic-based realizations of least mean logarithmic squares (LMLS) and least logarithmic absolute difference (LLAD) adaptive algorithms that include normalized LMLS (NLMLS) algorithm, normalized LLAD (NLLAD) algorithm, and their signed variants. This book ends with an overview of the goals achieved and highlights the primary achievements using all proposed techniques. This book is intended to provide rigorous use of adaptive signal processing algorithms for genetic engineering, biomedical engineering, and bioinformatics and is useful for undergraduate and postgraduate students. This will also serve as a practical guide for Ph.D. students and researchers and will provide a number of research directions for further work. Features Presents an overview of genomics engineering, structure of DNA sequence and its building blocks, genetic information flow in a cell, gene prediction along with its significance, and various types of gene prediction methods Covers various theoretical considerations of adaptive filtering techniques used for DNA analysis, introduction to adaptive filtering, properties of adaptive algorithms, need for development of adaptive exon predictors (AEPs), and structure of AEP used for DNA analysis Extends the approach of LMS algorithm and its sign-based realizations with normalization factor for DNA analysis Presents the normalized logarithmic-based realizations of LMLS and LLAD adaptive algorithms that include normalized LMLS (NLMLS) algorithm, normalized LLAD (NLLAD) algorithm, and their signed variants Provides an overview of the goals achieved and highlights the primary achievements using all proposed techniques Dr. Md. Zia Ur Rahman is a professor in the Department of Electronics and Communication Engineering at Koneru Lakshmaiah Educational Foundation (K. L. University), Guntur, India. His current research interests include adaptive signal processing, biomedical signal processing, genetic engineering, medical imaging, array signal processing, medical telemetry, and nanophotonics. Dr. Srinivasareddy Putluri is currently a Software Engineer at Tata Consultancy Services Ltd., Hyderabad. He received his Ph.D. degree (Genomic Signal Processing using Adaptive Signal Processing algorithms) from the Department of Electronics and Communication Engineering at Koneru Lakshmaiah Educational Foundation (K. L. University), Guntur, India. His research interests include genomic signal processing and adaptive signal processing. He has published 15 research papers in various journals and proceedings. He is currently a reviewer of publishers like the IEEE Access and IGI.

Soft Computing Techniques for Engineering Optimization (Paperback): Kaushik Kumar, Supriyo Roy, J. Paulo Davim Soft Computing Techniques for Engineering Optimization (Paperback)
Kaushik Kumar, Supriyo Roy, J. Paulo Davim
R1,431 Discovery Miles 14 310 Ships in 12 - 17 working days

This book covers the issues related to optimization of engineering and management problems using soft computing techniques with an industrial outlook. It covers a broad area related to real life complex decision making problems using a heuristics approach. It also explores a wide perspective and future directions in industrial engineering research on a global platform/scenario. The book highlights the concept of optimization, presents various soft computing techniques, offers sample problems, and discusses related software programs complete with illustrations. Features Explains the concept of optimization and relevance to soft computing techniques towards optimal solution in engineering and management Presents various soft computing techniques Offers problems and their optimization using various soft computing techniques Discusses related software programs, with illustrations Provides a step-by-step tutorial on how to handle relevant software for obtaining the optimal solution to various engineering problems

Data Structure and Software Engineering - Challenges and Improvements (Paperback): James L. Antonakos Data Structure and Software Engineering - Challenges and Improvements (Paperback)
James L. Antonakos
R2,595 Discovery Miles 25 950 Ships in 12 - 17 working days

This title includes a number of Open Access chapters. Data structure and software engineering is an integral part of computer science. This volume presents new approaches and methods to knowledge sharing, brain mapping, data integration, and data storage. The author describes how to manage an organization's business process and domain data and presents new software and hardware testing methods. The book introduces a game development framework used as a learning aid in a software engineering at the university level. It also features a review of social software engineering metrics and methods for processing business information. It explains how to use Pegasys to create and manage sequence analysis workflows.

Polygonal Approximation and Scale-Space Analysis of Closed Digital Curves (Paperback): Kumar S. Ray, Bimal Kumar  Ray Polygonal Approximation and Scale-Space Analysis of Closed Digital Curves (Paperback)
Kumar S. Ray, Bimal Kumar Ray
R2,600 Discovery Miles 26 000 Ships in 12 - 17 working days

This book covers the most important topics in the area of pattern recognition, object recognition, computer vision, robot vision, medical computing, computational geometry, and bioinformatics systems. Students and researchers will find a comprehensive treatment of polygonal approximation and its real life applications. The book not only explains the theoretical aspects but also presents applications with detailed design parameters. The systematic development of the concept of polygonal approximation of digital curves and its scale-space analysis are useful and attractive to scholars in many fields.

Algorithmic Techniques for the Polymer Sciences (Paperback): Bradley S. Tice Algorithmic Techniques for the Polymer Sciences (Paperback)
Bradley S. Tice
R2,580 Discovery Miles 25 800 Ships in 12 - 17 working days

This new book-the first of its kind-examines the use of algorithmic techniques to compress random and non-random sequential strings found in chains of polymers. The book is an introduction to algorithmic complexity. Examples taken from current research in the polymer sciences are used for compression of like-natured properties as found on a chain of polymers. Both theory and applied aspects of algorithmic compression are reviewed. A description of the types of polymers and their uses is followed by a chapter on various types of compression systems that can be used to compress polymer chains into manageable units. The work is intended for graduate and postgraduate university students in the physical sciences and engineering.

Large Deviations For Performance Analysis - Queues, Communication and Computing (Paperback): Alan Weiss, Adam Shwartz Large Deviations For Performance Analysis - Queues, Communication and Computing (Paperback)
Alan Weiss, Adam Shwartz
R1,489 Discovery Miles 14 890 Ships in 12 - 17 working days

Originally published in 1995, Large Deviations for Performance Analysis consists of two synergistic parts. The first half develops the theory of large deviations from the beginning, through recent results on the theory for processes with boundaries, keeping to a very narrow path: continuous-time, discrete-state processes. By developing only what is needed for the applications, the theory is kept to a manageable level, both in terms of length and in terms of difficulty. Within its scope, the treatment is detailed, comprehensive and self-contained. As the book shows, there are sufficiently many interesting applications of jump Markov processes to warrant a special treatment. The second half is a collection of applications developed at Bell Laboratories. The applications cover large areas of the theory of communication networks: circuit switched transmission, packet transmission, multiple access channels, and the M/M/1 queue. Aspects of parallel computation are covered as well including, basics of job allocation, rollback-based parallel simulation, assorted priority queueing models that might be used in performance models of various computer architectures, and asymptotic coupling of processors. These applications are thoroughly analysed using the tools developed in the first half of the book.

IP Routing Protocols - Link-State and Path-Vector Routing Protocols (Paperback): James Aweya IP Routing Protocols - Link-State and Path-Vector Routing Protocols (Paperback)
James Aweya
R2,174 Discovery Miles 21 740 Ships in 12 - 17 working days

This book discusses link-state routing protocols (OSPF and IS-IS), and the path-vector routing protocol (BGP). It covers their most identifying characteristics, operations, and the databases they maintain. Material is presented from a practicing engineer's perspective, linking theory and fundamental concepts to common practices and real-world examples. Every aspect of the book is written to reflect current best practices using real-world examples. The book begins with a detailed description of the OSPF area types and hierarchical routing, and the different types of routers used in an OSPF autonomous system. The author goes on to describe in detail the different OSPF packet types, and inbound and outbound processing of OSPF link-state advertisements (LSAs). Next, the book gives an overview of the main features of IS-IS. The author then discusses the two-level routing hierarchy for controlling the distribution of intra-domain (Level 1) and inter-domain (Level 2) routing information within an IS-IS routing domain. He then describes in detail IS-IS network address formats, IS-IS routing metrics, IS-IS packet types, IS-IS network types and adjacency formation, IS-IS LSDB and synchronization, and IS-IS authentication. The book then reviews the main concepts of path-vector routing protocols, and describes BGP packet types, BGP session states and Finite State Machine, BGP path attributes types, and BGP Autonomous System Numbers (ASNs). Focuses solely on link-state routing protocols (OSPF and IS-IS), and the only path-vector routing protocol in use today (BGP). Reviews the basic concepts underlying the design of IS-IS and provides a detailed description of IS-IS area types and hierarchical routing, and the different types of routers used by IS-IS. Discusses the two-level routing hierarchy for controlling the distribution of intra-domain (Level 1) and inter-domain (Level 2) routing information within an IS-IS routing domain. Describes in detail BGP packet types, BGP session states and Finite State Machine, BGP path attributes types, and BGP ASNs, includes a high-level view of the typical BGP router and its components, and inbound and outbound message processing. James Aweya, PhD, is a chief research scientist at the Etisalat British Telecom Innovation Center (EBTIC), Khalifa University, Abu Dhabi, UAE. He has authored four books including this book and is a senior member of the Institute of Electrical and Electronics Engineers (IEEE).

IP Routing Protocols - Fundamentals and Distance-Vector Routing Protocols (Paperback): James Aweya IP Routing Protocols - Fundamentals and Distance-Vector Routing Protocols (Paperback)
James Aweya
R2,160 Discovery Miles 21 600 Ships in 12 - 17 working days

This book focuses on the fundamental concepts of IP routing and distance-vector routing protocols (RIPv2 and EIGRP). It discusses routing protocols from a practicing engineer's perspective, linking theory and fundamental concepts to common practices and everyday examples. The book benefits and reflects the author's more than 22 years of designing and working with IP routing devices and protocols (and Telecoms systems, in general). Every aspect of the book is written to reflect current best practices using real-world examples. This book describes the various methods used by routers to learn routing information. The author includes discussion of the characteristics of the different dynamic routing protocols, and how they differ in design and operation. He explains the processing steps involved in forwarding IP packets through an IP router to their destination and discusses the various mechanisms IP routers use for controlling routing in networks. The discussion is presented in a simple style to make it comprehensible and appealing to undergraduate and graduate level students, research and practicing engineers, scientists, IT personnel, and network engineers. It is geared toward readers who want to understand the concepts and theory of IP routing protocols, through real-world example systems and networks. Focuses on the fundamental concepts of IP routing and distance-vector routing protocols (RIPv2 and EIGRP). Describes the various methods used by routers to learn routing information. Includes discussion of the characteristics of the different dynamic routing protocols, and how they differ in design and operation. Provides detailed descriptions of the most common distance-vector routing protocols RIPv2 and EIGRP. Discusses the various mechanisms IP routers use for controlling routing in networks. James Aweya, PhD, is a chief research scientist at the Etisalat British Telecom Innovation Center (EBTIC), Khalifa University, Abu Dhabi, UAE. He has authored four books including this book and is a senior member of the Institute of Electrical and Electronics Engineers (IEEE).

Transportation Networks - A Quantitative Treatment (Hardcover): D. Teodorovic Transportation Networks - A Quantitative Treatment (Hardcover)
D. Teodorovic
R2,859 Discovery Miles 28 590 Ships in 12 - 17 working days

Originally published in 1986 and a major contribution towards improving operations within transportation systems, this book provides detailed coverage of the theory of transportation networks as a general traffic and transportation discipline. It examines some of the daily difficulties encountered by traffic and transportation experts, uncovering the intricacies of vehicle routing and scheduling, crew planning and facilities placement. This problem-solving approach uses multiple numerical examples and simple mathematical methods to enable newcomers to apply the book's solutions to the situations they encounter on the job.

Artificial Intelligence for the Internet of Health Things (Hardcover): K Shankar, Eswaran Perumal, Deepak Gupta Artificial Intelligence for the Internet of Health Things (Hardcover)
K Shankar, Eswaran Perumal, Deepak Gupta
R3,705 Discovery Miles 37 050 Ships in 12 - 17 working days

This book discusses research in Artificial Intelligence for the Internet of Health Things. It investigates and explores the possible applications of machine learning, deep learning, soft computing, and evolutionary computing techniques in design, implementation, and optimization of challenging healthcare solutions. This book features a wide range of topics such as AI techniques, IoT, cloud, wearables, and secured data transmission. Written for a broad audience, this book will be useful for clinicians, health professionals, engineers, technology developers, IT consultants, researchers, and students interested in the AI-based healthcare applications. Provides a deeper understanding of key AI algorithms and their use and implementation within the wider healthcare sector Explores different disease diagnosis models using machine learning, deep learning, healthcare data analysis, including machine learning, and data mining and soft computing algorithms Discusses detailed IoT, wearables, and cloud-based disease diagnosis model for intelligent systems and healthcare Reviews different applications and challenges across the design, implementation, and management of intelligent systems and healthcare data networks Introduces a new applications and case studies across all areas of AI in healthcare data K. Shankar (Member, IEEE) is a Postdoctoral Fellow of the Department of Computer Applications, Alagappa University, Karaikudi, India. Eswaran Perumal is an Assistant Professor of the Department of Computer Applications, Alagappa University, Karaikudi, India. Dr. Deepak Gupta is an Assistant Professor of the Department Computer Science & Engineering, Maharaja Agrasen Institute of Technology (GGSIPU), Delhi, India.

Hidden Markov Models - Theory and Implementation using MATLAB (R) (Paperback): Joao Paulo Coelho, Tatiana M. Pinho, Jose... Hidden Markov Models - Theory and Implementation using MATLAB (R) (Paperback)
Joao Paulo Coelho, Tatiana M. Pinho, Jose Boaventura-Cunha
R1,537 Discovery Miles 15 370 Ships in 12 - 17 working days

This book presents, in an integrated form, both the analysis and synthesis of three different types of hidden Markov models. Unlike other books on the subject, it is generic and does not focus on a specific theme, e.g. speech processing. Moreover, it presents the translation of hidden Markov models' concepts from the domain of formal mathematics into computer codes using MATLAB (R). The unique feature of this book is that the theoretical concepts are first presented using an intuition-based approach followed by the description of the fundamental algorithms behind hidden Markov models using MATLAB (R). This approach, by means of analysis followed by synthesis, is suitable for those who want to study the subject using a more empirical approach. Key Selling Points: Presents a broad range of concepts related to Hidden Markov Models (HMM), from simple problems to advanced theory Covers the analysis of both continuous and discrete Markov chains Discusses the translation of HMM concepts from the realm of formal mathematics into computer code Offers many examples to supplement mathematical notation when explaining new concepts

Machine Learning for Computer and Cyber Security - Principle, Algorithms, and Practices (Paperback): Brij B. Gupta, Quan Z.... Machine Learning for Computer and Cyber Security - Principle, Algorithms, and Practices (Paperback)
Brij B. Gupta, Quan Z. Sheng
R1,600 Discovery Miles 16 000 Ships in 12 - 17 working days

While Computer Security is a broader term which incorporates technologies, protocols, standards and policies to ensure the security of the computing systems including the computer hardware, software and the information stored in it, Cyber Security is a specific, growing field to protect computer networks (offline and online) from unauthorized access, botnets, phishing scams, etc. Machine learning is a branch of Computer Science which enables computing machines to adopt new behaviors on the basis of observable and verifiable data and information. It can be applied to ensure the security of the computers and the information by detecting anomalies using data mining and other such techniques. This book will be an invaluable resource to understand the importance of machine learning and data mining in establishing computer and cyber security. It emphasizes important security aspects associated with computer and cyber security along with the analysis of machine learning and data mining based solutions. The book also highlights the future research domains in which these solutions can be applied. Furthermore, it caters to the needs of IT professionals, researchers, faculty members, scientists, graduate students, research scholars and software developers who seek to carry out research and develop combating solutions in the area of cyber security using machine learning based approaches. It is an extensive source of information for the readers belonging to the field of Computer Science and Engineering, and Cyber Security professionals. Key Features: This book contains examples and illustrations to demonstrate the principles, algorithms, challenges and applications of machine learning and data mining for computer and cyber security. It showcases important security aspects and current trends in the field. It provides an insight of the future research directions in the field. Contents of this book help to prepare the students for exercising better defense in terms of understanding the motivation of the attackers and how to deal with and mitigate the situation using machine learning based approaches in better manner.

Complexity Science - The Study of Emergence (Hardcover): Henrik Jeldtoft Jensen Complexity Science - The Study of Emergence (Hardcover)
Henrik Jeldtoft Jensen
R1,322 Discovery Miles 13 220 Ships in 9 - 15 working days

Ecosystems, the human brain, ant colonies, and economic networks are all complex systems displaying collective behaviour, or emergence, beyond the sum of their parts. Complexity science is the systematic investigation of these emergent phenomena, and stretches across disciplines, from physics and mathematics, to biological and social sciences. This introductory textbook provides detailed coverage of this rapidly growing field, accommodating readers from a variety of backgrounds, and with varying levels of mathematical skill. Part I presents the underlying principles of complexity science, to ensure students have a solid understanding of the conceptual framework. The second part introduces the key mathematical tools central to complexity science, gradually developing the mathematical formalism, with more advanced material provided in boxes. A broad range of end of chapter problems and extended projects offer opportunities for homework assignments and student research projects, with solutions available to instructors online. Key terms are highlighted in bold and listed in a glossary for easy reference, while annotated reading lists offer the option for extended reading and research.

Arc-Search Techniques for Interior-Point Methods (Hardcover): Yaguang Yang Arc-Search Techniques for Interior-Point Methods (Hardcover)
Yaguang Yang
R4,007 Discovery Miles 40 070 Ships in 12 - 17 working days

This book discusses an important area of numerical optimization, called interior-point method. This topic has been popular since the 1980s when people gradually realized that all simplex algorithms were not convergent in polynomial time and many interior-point algorithms could be proved to converge in polynomial time. However, for a long time, there was a noticeable gap between theoretical polynomial bounds of the interior-point algorithms and efficiency of these algorithms. Strategies that were important to the computational efficiency became barriers in the proof of good polynomial bounds. The more the strategies were used in algorithms, the worse the polynomial bounds became. To further exacerbate the problem, Mehrotra's predictor-corrector (MPC) algorithm (the most popular and efficient interior-point algorithm until recently) uses all good strategies and fails to prove the convergence. Therefore, MPC does not have polynomiality, a critical issue with the simplex method. This book discusses recent developments that resolves the dilemma. It has three major parts. The first, including Chapters 1, 2, 3, and 4, presents some of the most important algorithms during the development of the interior-point method around the 1990s, most of them are widely known. The main purpose of this part is to explain the dilemma described above by analyzing these algorithms' polynomial bounds and summarizing the computational experience associated with them. The second part, including Chapters 5, 6, 7, and 8, describes how to solve the dilemma step-by-step using arc-search techniques. At the end of this part, a very efficient algorithm with the lowest polynomial bound is presented. The last part, including Chapters 9, 10, 11, and 12, extends arc-search techniques to some more general problems, such as convex quadratic programming, linear complementarity problem, and semi-definite programming.

Anyone Can Code - The Art and Science of Logical Creativity (Hardcover): Ali Arya Anyone Can Code - The Art and Science of Logical Creativity (Hardcover)
Ali Arya
R4,557 Discovery Miles 45 570 Ships in 12 - 17 working days

Anyone Can Code: The Art and Science of Logical Creativity introduces computer programming as a way of problem-solving through logical thinking. It uses the notion of modularization as a central lens through which we can make sense of many software concepts. This book takes the reader through fundamental concepts in programming by illustrating them in three different and distinct languages: C/C++, Python, and Javascript. Key features: Focuses on problem-solving and algorithmic thinking instead of programming functions, syntax, and libraries; Includes engaging examples, including video games and visual effects; Provides exercises and reflective questions. This book gives beginner and intermediate learners a strong understanding of what they are doing so that they can do it better and with any other tool or language that they may end up using later.

Algebraic Structures in Natural Language (Hardcover): Shalom Lappin, Jean-Philippe Bernardy Algebraic Structures in Natural Language (Hardcover)
Shalom Lappin, Jean-Philippe Bernardy
R2,212 Discovery Miles 22 120 Ships in 12 - 17 working days

Addresses a central problem in cognitive science, concerning the learning procedures through which humans acquire and represent natural language. Brings together world leading scholars from a range of disciplines, includingcomputational linguistics, psychology, behavioural science, and mathematical linguistics. Will appeal to researchers in computational and mathematical linguistics, psychology and behavioral science, AI and NLP. Represents a wide spectrum of perspectives

Machine Learning - Theory and Practice (Hardcover): Jugal Kalita Machine Learning - Theory and Practice (Hardcover)
Jugal Kalita
R3,407 Discovery Miles 34 070 Ships in 12 - 17 working days

Machine Learning: Theory and Practice provides an introduction to the most popular methods in machine learning. The book covers regression including regularization, tree-based methods including Random Forests and Boosted Trees, Artificial Neural Networks including Convolutional Neural Networks (CNNs), reinforcement learning, and unsupervised learning focused on clustering. Topics are introduced in a conceptual manner along with necessary mathematical details. The explanations are lucid, illustrated with figures and examples. For each machine learning method discussed, the book presents appropriate libraries in the R programming language along with programming examples. Features: Provides an easy-to-read presentation of commonly used machine learning algorithms in a manner suitable for advanced undergraduate or beginning graduate students, and mathematically and/or programming-oriented individuals who want to learn machine learning on their own. Covers mathematical details of the machine learning algorithms discussed to ensure firm understanding, enabling further exploration Presents worked out suitable programming examples, thus ensuring conceptual, theoretical and practical understanding of the machine learning methods. This book is aimed primarily at introducing essential topics in Machine Learning to advanced undergraduates and beginning graduate students. The number of topics has been kept deliberately small so that it can all be covered in a semester or a quarter. The topics are covered in depth, within limits of what can be taught in a short period of time. Thus, the book can provide foundations that will empower a student to read advanced books and research papers.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Exam Ref 70-535 Architecting Microsoft…
Haishi Bai, Dan Stolts, … Paperback R1,015 R773 Discovery Miles 7 730
Diagnosis of Neurological Disorders…
Jyotismita Chaki Hardcover R2,794 Discovery Miles 27 940
AI for Scientific Discovery
Janna Hastings Hardcover R3,666 Discovery Miles 36 660
The Garbage Collection Handbook - The…
Richard Jones, Antony Hosking, … Paperback R1,450 Discovery Miles 14 500
The Garbage Collection Handbook - The…
Richard Jones, Antony Hosking, … Hardcover R1,922 Discovery Miles 19 220
Data: A Guide to Humans
Phil Harvey, Noelia Jimenez Martinez Hardcover R355 Discovery Miles 3 550
Advances in Optimization and Linear…
Ivan Stanimirovic Hardcover R3,494 Discovery Miles 34 940
How to Prove It - A Structured Approach
Daniel J. Velleman Paperback R1,117 Discovery Miles 11 170
Algorithms Illuminated - Omnibus Edition
Tim Roughgarden Hardcover R1,594 Discovery Miles 15 940
Computational Statistical Methodologies…
Priyanka Harjule, Azizur Rahman, … Hardcover R4,382 Discovery Miles 43 820

 

Partners