0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (5)
  • R250 - R500 (58)
  • R500+ (5,332)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer programming > Algorithms & procedures

Analysis and Synthesis of Positive Systems Under  1 and L1 Performance (Hardcover, 1st ed. 2017): Xiao-Ming Chen Analysis and Synthesis of Positive Systems Under 1 and L1 Performance (Hardcover, 1st ed. 2017)
Xiao-Ming Chen
R3,172 Discovery Miles 31 720 Ships in 18 - 22 working days

This thesis introduces novel and significant results regarding the analysis and synthesis of positive systems, especially under l1 and L1 performance. It describes stability analysis, controller synthesis, and bounding positivity-preserving observer and filtering design for a variety of both discrete and continuous positive systems. It subsequently derives computationally efficient solutions based on linear programming in terms of matrix inequalities, as well as a number of analytical solutions obtained for special cases. The thesis applies a range of novel approaches and fundamental techniques to the further study of positive systems, thus contributing significantly to the theory of positive systems, a "hot topic" in the field of control.

Proceedings of ELM-2017 (Hardcover, 1st ed. 2019): Jiuwen Cao, Chi Man Vong, Yoan Miche, Amaury Lendasse Proceedings of ELM-2017 (Hardcover, 1st ed. 2019)
Jiuwen Cao, Chi Man Vong, Yoan Miche, Amaury Lendasse
R5,186 Discovery Miles 51 860 Ships in 18 - 22 working days

This book contains some selected papers from the International Conference on Extreme Learning Machine (ELM) 2017, held in Yantai, China, October 4-7, 2017. The book covers theories, algorithms and applications of ELM. Extreme Learning Machines (ELM) aims to enable pervasive learning and pervasive intelligence. As advocated by ELM theories, it is exciting to see the convergence of machine learning and biological learning from the long-term point of view. ELM may be one of the fundamental `learning particles' filling the gaps between machine learning and biological learning (of which activation functions are even unknown). ELM represents a suite of (machine and biological) learning techniques in which hidden neurons need not be tuned: inherited from their ancestors or randomly generated. ELM learning theories show that effective learning algorithms can be derived based on randomly generated hidden neurons (biological neurons, artificial neurons, wavelets, Fourier series, etc) as long as they are nonlinear piecewise continuous, independent of training data and application environments. Increasingly, evidence from neuroscience suggests that similar principles apply in biological learning systems. ELM theories and algorithms argue that "random hidden neurons" capture an essential aspect of biological learning mechanisms as well as the intuitive sense that the efficiency of biological learning need not rely on computing power of neurons. ELM theories thus hint at possible reasons why the brain is more intelligent and effective than current computers. This conference will provide a forum for academics, researchers and engineers to share and exchange R&D experience on both theoretical studies and practical applications of the ELM technique and brain learning. It gives readers a glance of the most recent advances of ELM.

Theoretical Computer Science - 6th IFIP WG 2.2 International Conference, TCS 2010, Held as a Part of WCC 2010, Brisbane,... Theoretical Computer Science - 6th IFIP WG 2.2 International Conference, TCS 2010, Held as a Part of WCC 2010, Brisbane, Australia, September 20-23, 2010, Proceedings (Hardcover, Edition.)
Christian S. Calude, Vladimiro Sassone
R1,464 Discovery Miles 14 640 Ships in 18 - 22 working days

Thisvolumecontainstheinvitedandregularpaperspresentedat TCS 2010, the 6thIFIP International Conference on Theoretical Computer Science, organised by IFIP Tech- cal Committee 1 (Foundations of Computer Science) and IFIP WG 2.2 (Formal - scriptions of Programming Concepts) in association with SIGACT and EATCS. TCS 2010 was part of the World Computer Congress held in Brisbane, Australia, during September 20-23, 2010 ( ). TCS 2010 is composed of two main areas: (A) Algorithms, Complexity and Models of Computation, and (B) Logic, Semantics, Speci?cation and Veri?cation. The selection process led to the acceptance of 23 papers out of 39 submissions, eachofwhichwasreviewedbythreeProgrammeCommitteemembers.TheProgramme Committee discussion was held electronically using Easychair. The invited speakers at TCS 2010 are: Rob van Glabbeek (NICTA, Australia) Bart Jacobs (Nijmegen, The Netherlands) Catuscia Palamidessi (INRIA and LIX, Paris, France) Sabina Rossi (Venice, Italy) James Harland (Australia) and Barry Jay (Australia) acted as TCS 2010 Chairs. We take this occasion to thank the members of the Programme Committees and the external reviewers for the professional and timely work; the conference Chairs for their support; the invited speakers for their scholarly contribution; and of course the authors for submitting their work to TCS 2010

Neutrosophic Graph Theory and Algorithms (Hardcover): Florentin Smarandache, Said Broumi Neutrosophic Graph Theory and Algorithms (Hardcover)
Florentin Smarandache, Said Broumi
R6,641 Discovery Miles 66 410 Ships in 18 - 22 working days

Graph theory is a specific concept that has numerous applications throughout many industries. Despite the advancement of this technique, graph theory can still yield ambiguous and imprecise results. In order to cut down on these indeterminate factors, neutrosophic logic has emerged as an applicable solution that is gaining significant attention in solving many real-life decision-making problems that involve uncertainty, impreciseness, vagueness, incompleteness, inconsistency, and indeterminacy. However, empirical research on this specific graph set is lacking. Neutrosophic Graph Theory and Algorithms is a collection of innovative research on the methods and applications of neutrosophic sets and logic within various fields including systems analysis, economics, and transportation. While highlighting topics including linear programming, decision-making methods, and homomorphism, this book is ideally designed for programmers, researchers, data scientists, mathematicians, designers, educators, researchers, academicians, and students seeking current research on the various methods and applications of graph theory.

Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion,... Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012, Proceedings (Hardcover)
Dimitris Gritzalis, Steven Furnell, Marianthi Theoharidou
R2,764 Discovery Miles 27 640 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 27th IFIP TC 11 International Information Security Conference, SEC 2012, held in Heraklion, Crete, Greece, in June 2012. The 42 revised full papers presented together with 11 short papers were carefully reviewed and selected from 167 submissions. The papers are organized in topical sections on attacks and malicious code, security architectures, system security, access control, database security, privacy attitudes and properties, social networks and social engineering, applied cryptography, anonymity and trust, usable security, security and trust models, security economics, and authentication and delegation.

Computational Intelligence for Privacy and Security (Hardcover, 2012 ed.): David A. Elizondo, Agusti Solanas, Antoni... Computational Intelligence for Privacy and Security (Hardcover, 2012 ed.)
David A. Elizondo, Agusti Solanas, Antoni Martinez-Balleste
R4,033 Discovery Miles 40 330 Ships in 18 - 22 working days

The book is a collection of invited papers on Computational Intelligence for Privacy and Security. The majority of the chapters are extended versions of works presented at the special session on Computational Intelligence for Privacy and Security of the International Joint Conference on Neural Networks (IJCNN-2010) held July 2010 in Barcelona, Spain. The book is devoted to Computational Intelligence for Privacy and Security. It provides an overview of the most recent advances on the Computational Intelligence techniques being developed for Privacy and Security. The book will be of interest to researchers in industry and academics and to post-graduate students interested in the latest advances and developments in the field of Computational Intelligence for Privacy and Security.

Automating the Design of Data Mining Algorithms - An Evolutionary Computation Approach (Hardcover, 2010 ed.): Gisele L. Pappa,... Automating the Design of Data Mining Algorithms - An Evolutionary Computation Approach (Hardcover, 2010 ed.)
Gisele L. Pappa, Alex Freitas
R2,662 Discovery Miles 26 620 Ships in 18 - 22 working days

Data mining is a very active research area with many successful real-world app- cations. It consists of a set of concepts and methods used to extract interesting or useful knowledge (or patterns) from real-world datasets, providing valuable support for decision making in industry, business, government, and science. Although there are already many types of data mining algorithms available in the literature, it is still dif cult for users to choose the best possible data mining algorithm for their particular data mining problem. In addition, data mining al- rithms have been manually designed; therefore they incorporate human biases and preferences. This book proposes a new approach to the design of data mining algorithms. - stead of relying on the slow and ad hoc process of manual algorithm design, this book proposes systematically automating the design of data mining algorithms with an evolutionary computation approach. More precisely, we propose a genetic p- gramming system (a type of evolutionary computation method that evolves c- puter programs) to automate the design of rule induction algorithms, a type of cl- si cation method that discovers a set of classi cation rules from data. We focus on genetic programming in this book because it is the paradigmatic type of machine learning method for automating the generation of programs and because it has the advantage of performing a global search in the space of candidate solutions (data mining algorithms in our case), but in principle other types of search methods for this task could be investigated in the future.

Experimental Methods for the Analysis of Optimization Algorithms (Hardcover, 2010 ed.): Thomas Bartz-beielstein, Marco... Experimental Methods for the Analysis of Optimization Algorithms (Hardcover, 2010 ed.)
Thomas Bartz-beielstein, Marco Chiarandini, Luis Paquete, Mike Preuss
R3,878 Discovery Miles 38 780 Ships in 18 - 22 working days

In operations research and computer science it is common practice to evaluate the performance of optimization algorithms on the basis of computational results, and the experimental approach should follow accepted principles that guarantee the reliability and reproducibility of results. However, computational experiments differ from those in other sciences, and the last decade has seen considerable methodological research devoted to understanding the particular features of such experiments and assessing the related statistical methods.

This book consists of methodological contributions on different scenarios of experimental analysis. The first part overviews the main issues in the experimental analysis of algorithms, and discusses the experimental cycle of algorithm development; the second part treats the characterization by means of statistical distributions of algorithm performance in terms of solution quality, runtime and other measures; and the third part collects advanced methods from experimental design for configuring and tuning algorithms on a specific class of instances with the goal of using the least amount of experimentation. The contributor list includes leading scientists in algorithm design, statistical design, optimization and heuristics, and most chapters provide theoretical background and are enriched with case studies.

This book is written for researchers and practitioners in operations research and computer science who wish to improve the experimental assessment of optimization algorithms and, consequently, their design.

On the Physical Security of Physically Unclonable Functions (Hardcover, 1st ed. 2019): Shahin Tajik On the Physical Security of Physically Unclonable Functions (Hardcover, 1st ed. 2019)
Shahin Tajik
R2,630 Discovery Miles 26 300 Ships in 18 - 22 working days

This book investigates the susceptibility of intrinsic physically unclonable function (PUF) implementations on reconfigurable hardware to optical semi-invasive attacks from the chip backside. It explores different classes of optical attacks, particularly photonic emission analysis, laser fault injection, and optical contactless probing. By applying these techniques, the book demonstrates that the secrets generated by a PUF can be predicted, manipulated or directly probed without affecting the behavior of the PUF. It subsequently discusses the cost and feasibility of launching such attacks against the very latest hardware technologies in a real scenario. The author discusses why PUFs are not tamper-evident in their current configuration, and therefore, PUFs alone cannot raise the security level of key storage. The author then reviews the potential and already implemented countermeasures, which can remedy PUFs' security-related shortcomings and make them resistant to optical side-channel and optical fault attacks. Lastly, by making selected modifications to the functionality of an existing PUF architecture, the book presents a prototype tamper-evident sensor for detecting optical contactless probing attempts.

Digital Communication - Communication, Multimedia, Security (Hardcover, 2014): Christoph Meinel, Harald Sack Digital Communication - Communication, Multimedia, Security (Hardcover, 2014)
Christoph Meinel, Harald Sack
R2,837 R2,071 Discovery Miles 20 710 Save R766 (27%) Ships in 10 - 15 working days

The authors give a detailed summary about the fundamentals and the historical background of digital communication. This includes an overview of the encoding principles and algorithms of textual information, audio information, as well as images, graphics, and video in the Internet. Furthermore the fundamentals of computer networking, digital security and cryptography are covered. Thus, the book provides a well-founded access to communication technology of computer networks, the internet and the WWW. Numerous pictures and images, a subject-index and a detailed list of historical personalities including a glossary for each chapter increase the practical benefit of this book that is well suited as well as for undergraduate students as for working practitioners.

Direct Methods for Limit and Shakedown Analysis of Structures - Advanced Computational Algorithms and Material Modelling... Direct Methods for Limit and Shakedown Analysis of Structures - Advanced Computational Algorithms and Material Modelling (Hardcover, 2015 ed.)
Paolo Fuschi, Aurora Angela Pisano, Dieter Weichert
R4,006 R3,475 Discovery Miles 34 750 Save R531 (13%) Ships in 10 - 15 working days

Articles in this book examine various materials and how to determine directly the limit state of a structure, in the sense of limit analysis and shakedown analysis. Apart from classical applications in mechanical and civil engineering contexts, the book reports on the emerging field of material design beyond the elastic limit, which has further industrial design and technological applications. Readers will discover that "Direct Methods" and the techniques presented here can in fact be used to numerically estimate the strength of structured materials such as composites or nano-materials, which represent fruitful fields of future applications. Leading researchers outline the latest computational tools and optimization techniques and explore the possibility of obtaining information on the limit state of a structure whose post-elastic loading path and constitutive behavior are not well defined or well known. Readers will discover how Direct Methods allow rapid and direct access to requested information in mathematically constructive manners without cumbersome step-by-step computation. Both researchers already interested or involved in the field and practical engineers who want to have a panorama of modern methods for structural safety assessment will find this book valuable. It provides the reader with the latest developments and a significant amount of references on the topic.

Polynomial Theory of Error Correcting Codes (Hardcover, 2015 ed.): Giovanni Cancellieri Polynomial Theory of Error Correcting Codes (Hardcover, 2015 ed.)
Giovanni Cancellieri
R4,162 Discovery Miles 41 620 Ships in 18 - 22 working days

The book offers an original view on channel coding, based on a unitary approach to block and convolutional codes for error correction. It presents both new concepts and new families of codes. For example, lengthened and modified lengthened cyclic codes are introduced as a bridge towards time-invariant convolutional codes and their extension to time-varying versions. The novel families of codes include turbo codes and low-density parity check (LDPC) codes, the features of which are justified from the structural properties of the component codes. Design procedures for regular LDPC codes are proposed, supported by the presented theory. Quasi-cyclic LDPC codes, in block or convolutional form, represent one of the most original contributions of the book. The use of more than 100 examples allows the reader gradually to gain an understanding of the theory, and the provision of a list of more than 150 definitions, indexed at the end of the book, permits rapid location of sought information.

Algorithms on Trees and Graphs (Hardcover, 2002 ed.): Gabriel Valiente Algorithms on Trees and Graphs (Hardcover, 2002 ed.)
Gabriel Valiente
R2,131 Discovery Miles 21 310 Ships in 18 - 22 working days

Graph algorithms is a well-established subject in mathematics and computer science. Beyond classical application fields, such as approximation, combinatorial optimization, graphics, and operations research, graph algorithms have recently attracted increased attention from computational molecular biology and computational chemistry. Centered around the fundamental issue of graph isomorphism, this text goes beyond classical graph problems of shortest paths, spanning trees, flows in networks, and matchings in bipartite graphs. Advanced algorithmic results and techniques of practical relevance are presented in a coherent and consolidated way. This book introduces graph algorithms on an intuitive basis followed by a detailed exposition in a literate programming style, with correctness proofs as well as worst-case analyses. Furthermore, full C++ implementations of all algorithms presented are given using the LEDA library of efficient data structures and algorithms.

Embedded Microcontroller Interfacing - Designing Integrated Projects (Hardcover, Edition.): Gourab Sen Gupta Embedded Microcontroller Interfacing - Designing Integrated Projects (Hardcover, Edition.)
Gourab Sen Gupta
R4,029 Discovery Miles 40 290 Ships in 18 - 22 working days

Mixed-Signal Embedded Microcontrollers are commonly used in integrating analog components needed to control non-digital electronic systems. They are used in automatically controlled devices and products, such as automobile engine control systems, wireless remote controllers, office machines, home appliances, power tools, and toys. Microcontrollers make it economical to digitally control even more devices and processes by reducing the size and cost, compared to a design that uses a separate microprocessor, memory, and input/output devices. In many undergraduate and post-graduate courses, teaching of mixed-signal microcontrollers and their use for project work has become compulsory. Students face a lot of difficulties when they have to interface a microcontroller with the electronics they deal with. This book addresses some issues of interfacing the microcontrollers and describes some project implementations with the Silicon Lab C8051F020 mixed-signal microcontroller. The intended readers are college and university students specializing in electronics, computer systems engineering, electrical and electronics engineering; researchers involved with electronics based system, practitioners, technicians and in general anybody interested in microcontrollers based projects.

Lipid-mediated Protein Signaling (Hardcover, 2013 ed.): Daniel G S Capelluto Lipid-mediated Protein Signaling (Hardcover, 2013 ed.)
Daniel G S Capelluto
R5,066 R4,745 Discovery Miles 47 450 Save R321 (6%) Ships in 10 - 15 working days

This book provides the most updated information of how membrane lipids mediate protein signaling from studies carried out in animal and plant cells. Also, there are some chapters that go beyond and expand these studies of protein-lipid interactions at the structural level. The book begins with a literature review from investigations associated to sphingolipids, followed by studies that describe the role of phosphoinositides in signaling and closing with the function of other key lipids in signaling at the plasma membrane and intracellular organelles.

Optimal Design of Distributed Control and Embedded Systems (Hardcover, 2014 ed.): Arben Cela, Mongi Ben Gaid, Xu-Guang Li,... Optimal Design of Distributed Control and Embedded Systems (Hardcover, 2014 ed.)
Arben Cela, Mongi Ben Gaid, Xu-Guang Li, Silviu-Iulian Niculescu
R4,048 Discovery Miles 40 480 Ships in 18 - 22 working days

"Optimal Design of Distributed Control and Embedded Systems "focuses on the design of special control and scheduling algorithms based on system structural properties as well as on analysis of the influence of induced time-delay on systems performances. It treats the optimal design of distributed and embedded control systems (DCESs) with respect to communication and calculation-resource constraints, quantization aspects, and potential time-delays induced by the associated communication and calculation model.

Particular emphasis is put on optimal control signal scheduling based on the system state. In order to render this complex optimization problem feasible in real time, a time decomposition is based on periodicity induced by the static scheduling is operated. The authors present a co-design approach which subsumes the synthesis of the optimal control laws and the generation of an optimal schedule of control signals on real-time networks as well as the execution of control tasks on a single processor. The authors also operate a control structure modification or a control switching based on a thorough analysis of the influence of the induced time-delay system influence on stability and system performance in order to optimize DCES performance in case of calculation and communication resource limitations. Although the richness and variety of classes of DCES preclude a completely comprehensive treatment or a single best method of approaching them all, this co-design approach has the best chance of rendering this problem feasible and finding the optimal or some sub-optimal solution. The text is rounded out with references to such applications as car suspension and unmanned vehicles.

"Optimal Design of Distributed Control and Embedded Systems" will be of most interest to academic researchers working on the mathematical theory of DCES but the wide range of environments in which they are used also promotes the relevance of the text for control practitioners working in the avionics, automotive, energy-production, space exploration and many other industries."

Algorithm Design: A Methodological Approach - 150 problems and detailed solutions (Paperback): Patrick Bosc, Marc Guyomard,... Algorithm Design: A Methodological Approach - 150 problems and detailed solutions (Paperback)
Patrick Bosc, Marc Guyomard, Laurent Miclet
R1,547 Discovery Miles 15 470 Ships in 9 - 17 working days

A best-seller in its French edition, the construction of this book is original and its success in the French market demonstrates its appeal. It is based on three principles: 1. An organization of the chapters by families of algorithms : exhaustive search, divide and conquer, etc. At the contrary, there is no chapter only devoted to a systematic exposure of, say, algorithms on strings. Some of these will be found in different chapters. 2. For each family of algorithms, an introduction is given to the mathematical principles and the issues of a rigorous design, with one or two pedagogical examples. 3. For its most part, the book details 150 problems, spanning on seven families of algorithms. For each problem, a precise and progressive statement is given. More important, a complete solution is detailed, with respect to the design principles that have been presented ; often, some classical errors are pointed at. Roughly speaking, two thirds of the book are devoted to the detailed rational construction of the solutions.

Mapping Scientific Frontiers - The Quest for Knowledge Visualization (Hardcover, 2nd ed. 2014): Chaomei Chen Mapping Scientific Frontiers - The Quest for Knowledge Visualization (Hardcover, 2nd ed. 2014)
Chaomei Chen
R4,096 R3,543 Discovery Miles 35 430 Save R553 (14%) Ships in 10 - 15 working days

This is an examination of the history and the state of the art of the quest for visualizing scientific knowledge and the dynamics of its development. Through an interdisciplinary perspective this book presents profound visions, pivotal advances, and insightful contributions made by generations of researchers and professionals, which portrays a holistic view of the underlying principles and mechanisms of the development of science. This updated and extended second edition: highlights the latest advances in mapping scientific frontiers examines the foundations of strategies, principles, and design patterns provides an integrated and holistic account of major developments across disciplinary boundaries "Anyone who tries to follow the exponential growth of the literature on citation analysis and scientometrics knows how difficult it is to keep pace. Chaomei Chen has identified the significant methods and applications in visual graphics and made them clear to the uninitiated. Derek Price would have loved this book which not only pays homage to him but also to the key players in information science and a wide variety of others in the sociology and history of science." - Eugene Garfield "This is a wide ranging book on information visualization, with a specific focus on science mapping. Science mapping is still in its infancy and many intellectual challenges remain to be investigated and many of which are outlined in the final chapter. In this new edition Chaomei Chen has provided an essential text, useful both as a primer for new entrants and as a comprehensive overview of recent developments for the seasoned practitioner." - Henry Small Chaomei Chen is a Professor in the College of Information Science and Technology at Drexel University, Philadelphia, USA, and a ChangJiang Scholar at Dalian University of Technology, Dalian, China. He is the Editor-in-Chief of Information Visualization and the author of Turning Points: The Nature of Creativity (Springer, 2012) and Information Visualization: Beyond the Horizon (Springer, 2004, 2006).

Computational Probability - Algorithms and Applications in the Mathematical Sciences (Hardcover, 2nd ed. 2017): John H. Drew,... Computational Probability - Algorithms and Applications in the Mathematical Sciences (Hardcover, 2nd ed. 2017)
John H. Drew, Diane L. Evans, Andrew G. Glen, Lawrence M. Leemis
R4,099 Discovery Miles 40 990 Ships in 10 - 15 working days

This new edition includes the latest advances and developments in computational probability involving A Probability Programming Language (APPL). The book examines and presents, in a systematic manner, computational probability methods that encompass data structures and algorithms. The developed techniques address problems that require exact probability calculations, many of which have been considered intractable in the past. The book addresses the plight of the probabilist by providing algorithms to perform calculations associated with random variables. Computational Probability: Algorithms and Applications in the Mathematical Sciences, 2nd Edition begins with an introductory chapter that contains short examples involving the elementary use of APPL. Chapter 2 reviews the Maple data structures and functions necessary to implement APPL. This is followed by a discussion of the development of the data structures and algorithms (Chapters 3-6 for continuous random variables and Chapters 7-9 for discrete random variables) used in APPL. The book concludes with Chapters 10-15 introducing a sampling of various applications in the mathematical sciences. This book should appeal to researchers in the mathematical sciences with an interest in applied probability and instructors using the book for a special topics course in computational probability taught in a mathematics, statistics, operations research, management science, or industrial engineering department.

Parameter Advising for Multiple Sequence Alignment (Hardcover, 1st ed. 2017): Dan DeBlasio, John Kececioglu Parameter Advising for Multiple Sequence Alignment (Hardcover, 1st ed. 2017)
Dan DeBlasio, John Kececioglu
R1,411 Discovery Miles 14 110 Ships in 18 - 22 working days

This book develops a new approach called parameter advising for finding a parameter setting for a sequence aligner that yields a quality alignment of a given set of input sequences. In this framework, a parameter advisor is a procedure that automatically chooses a parameter setting for the input, and has two main ingredients: (a) the set of parameter choices considered by the advisor, and (b) an estimator of alignment accuracy used to rank alignments produced by the aligner. On coupling a parameter advisor with an aligner, once the advisor is trained in a learning phase, the user simply inputs sequences to align, and receives an output alignment from the aligner, where the advisor has automatically selected the parameter setting. The chapters first lay out the foundations of parameter advising, and then cover applications and extensions of advising. The content * examines formulations of parameter advising and their computational complexity, * develops methods for learning good accuracy estimators, * presents approximation algorithms for finding good sets of parameter choices, and * assesses software implementations of advising that perform well on real biological data. Also explored are applications of parameter advising to * adaptive local realignment, where advising is performed on local regions of the sequences to automatically adapt to varying mutation rates, and * ensemble alignment, where advising is applied to an ensemble of aligners to effectively yield a new aligner of higher quality than the individual aligners in the ensemble. The book concludes by offering future directions in advising research.

Recent Advances in Swarm Intelligence and Evolutionary Computation (Hardcover, 2015 ed.): Xin-She Yang Recent Advances in Swarm Intelligence and Evolutionary Computation (Hardcover, 2015 ed.)
Xin-She Yang
R3,945 R3,415 Discovery Miles 34 150 Save R530 (13%) Ships in 10 - 15 working days

This timely review volume summarizes the state-of-the-art developments in nature-inspired algorithms and applications with the emphasis on swarm intelligence and bio-inspired computation. Topics include the analysis and overview of swarm intelligence and evolutionary computation, hybrid metaheuristic algorithms, bat algorithm, discrete cuckoo search, firefly algorithm, particle swarm optimization, and harmony search as well as convergent hybridization. Application case studies have focused on the dehydration of fruits and vegetables by the firefly algorithm and goal programming, feature selection by the binary flower pollination algorithm, job shop scheduling, single row facility layout optimization, training of feed-forward neural networks, damage and stiffness identification, synthesis of cross-ambiguity functions by the bat algorithm, web document clustering, truss analysis, water distribution networks, sustainable building designs and others. As a timely review, this book can serve as an ideal reference for graduates, lecturers, engineers and researchers in computer science, evolutionary computing, artificial intelligence, machine learning, computational intelligence, data mining, engineering optimization and designs.

Algorithms for Fuzzy Clustering - Methods in c-Means Clustering with Applications (Hardcover, 2008 ed.): Sadaaki Miyamoto,... Algorithms for Fuzzy Clustering - Methods in c-Means Clustering with Applications (Hardcover, 2008 ed.)
Sadaaki Miyamoto, Hidetomo Ichihashi, Katsuhiro Honda
R4,146 Discovery Miles 41 460 Ships in 18 - 22 working days

Recently many researchers are working on cluster analysis as a main tool for exploratory data analysis and data mining. A notable feature is that specialists in di?erent ?elds of sciences are considering the tool of data clustering to be useful. A major reason is that clustering algorithms and software are ?exible in thesensethatdi?erentmathematicalframeworksareemployedinthealgorithms and a user can select a suitable method according to his application. Moreover clusteringalgorithmshavedi?erentoutputsrangingfromtheolddendrogramsof agglomerativeclustering to more recent self-organizingmaps. Thus, a researcher or user can choose an appropriate output suited to his purpose, which is another ?exibility of the methods of clustering. An old and still most popular method is the K-means which use K cluster centers. A group of data is gathered around a cluster center and thus forms a cluster. The main subject of this book is the fuzzy c-means proposed by Dunn and Bezdek and their variations including recent studies. A main reasonwhy we concentrate on fuzzy c-means is that most methodology and application studies infuzzy clusteringusefuzzy c-means, andfuzzy c-meansshouldbe consideredto beamajortechniqueofclusteringingeneral, regardlesswhetheroneisinterested in fuzzy methods or not. Moreover recent advances in clustering techniques are rapid and we requirea new textbook that includes recent algorithms.We should also note that several books have recently been published but the contents do not include some methods studied here

High-Dimensional and Low-Quality Visual Information Processing - From Structured Sensing and Understanding (Hardcover, 2015... High-Dimensional and Low-Quality Visual Information Processing - From Structured Sensing and Understanding (Hardcover, 2015 ed.)
Yue Deng
R1,388 Discovery Miles 13 880 Ships in 18 - 22 working days

This thesis primarily focuses on how to carry out intelligent sensing and understand the high-dimensional and low-quality visual information. After exploring the inherent structures of the visual data, it proposes a number of computational models covering an extensive range of mathematical topics, including compressive sensing, graph theory, probabilistic learning and information theory. These computational models are also applied to address a number of real-world problems including biometric recognition, stereo signal reconstruction, natural scene parsing, and SAR image processing.

A Real-Time In-Memory Discovery Service - Leveraging Hierarchical Packaging Information in a Unique Identifier Network to... A Real-Time In-Memory Discovery Service - Leveraging Hierarchical Packaging Information in a Unique Identifier Network to Retrieve Track and Trace Information (Hardcover, 2013 ed.)
Jurgen Muller
R3,005 R1,834 Discovery Miles 18 340 Save R1,171 (39%) Ships in 10 - 15 working days

The research presented in this book discusses how to efficiently retrieve track and trace information for an item of interest that took a certain path through a complex network of manufacturers, wholesalers, retailers, and consumers. To this end, a super-ordinate system called "Discovery Service" is designed that has to handle large amounts of data, high insert-rates, and a high number of queries that are submitted to the discovery service. An example that is used throughout this book is the European pharmaceutical supply chain, which faces the challenge that more and more counterfeit medicinal products are being introduced. Between October and December 2008, more than 34 million fake drug pills were detected at customs control at the borders of the European Union. These fake drugs can put lives in danger as they were supposed to fight cancer, take effect as painkiller or antibiotics, among others. The concepts described in this book can be adopted for supply chain management use cases other than track and trace, such as recall, supply chain optimization, or supply chain analytics.

Nature-Inspired Computing and Optimization - Theory and Applications (Hardcover, 1st ed. 2017): Srikanta Patnaik, Xin-She Yang,... Nature-Inspired Computing and Optimization - Theory and Applications (Hardcover, 1st ed. 2017)
Srikanta Patnaik, Xin-She Yang, Kazumi Nakamatsu
R5,247 Discovery Miles 52 470 Ships in 10 - 15 working days

The book provides readers with a snapshot of the state of the art in the field of nature-inspired computing and its application in optimization. The approach is mainly practice-oriented: each bio-inspired technique or algorithm is introduced together with one of its possible applications. Applications cover a wide range of real-world optimization problems: from feature selection and image enhancement to scheduling and dynamic resource management, from wireless sensor networks and wiring network diagnosis to sports training planning and gene expression, from topology control and morphological filters to nutritional meal design and antenna array design. There are a few theoretical chapters comparing different existing techniques, exploring the advantages of nature-inspired computing over other methods, and investigating the mixing time of genetic algorithms. The book also introduces a wide range of algorithms, including the ant colony optimization, the bat algorithm, genetic algorithms, the collision-based optimization algorithm, the flower pollination algorithm, multi-agent systems and particle swarm optimization. This timely book is intended as a practice-oriented reference guide for students, researchers and professionals.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Promoting Continence - A Clinical and…
Kathryn Getliffe, Mary Dolman Paperback R1,019 Discovery Miles 10 190
Learn French with The Wonderful Wizard…
L. Frank Baum, Weeve Languages Paperback R454 Discovery Miles 4 540
Mommy! There's a Monster in our Computer…
N. K. McCarthy Hardcover R469 Discovery Miles 4 690
The new macro English aid - Language…
I. Uys Paperback R647 Discovery Miles 6 470
Die Singende Hand - Versamelde Gedigte…
Breyten Breytenbach Paperback R390 R348 Discovery Miles 3 480
Canonizing Hypertext - Explorations and…
Astrid Ensslin Hardcover R4,941 Discovery Miles 49 410
The Oxford Handbook of Propaganda…
Jonathan Auerbach, Russ Castronovo Hardcover R4,686 Discovery Miles 46 860
Practical Guide to Usability Testing
Joseph S. Dumas, Janice C. Redish Paperback R984 Discovery Miles 9 840
Eskom - Power, Politics And The (Post…
Faeeza Ballim Paperback R320 R295 Discovery Miles 2 950
Hybrid Encryption Algorithms over…
Mai Helmy Shaheen Hardcover R3,312 Discovery Miles 33 120

 

Partners