0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (5)
  • R250 - R500 (51)
  • R500+ (5,309)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer programming > Algorithms & procedures

Relational Calculus for Actionable Knowledge (Hardcover, 1st ed. 2022): Michel Bares, Eloi Bosse Relational Calculus for Actionable Knowledge (Hardcover, 1st ed. 2022)
Michel Bares, Eloi Bosse
R2,698 Discovery Miles 26 980 Ships in 18 - 22 working days

This book focuses on one of the major challenges of the newly created scientific domain known as data science: turning data into actionable knowledge in order to exploit increasing data volumes and deal with their inherent complexity. Actionable knowledge has been qualitatively and intensively studied in management, business, and the social sciences but in computer science and engineering, its connection has only recently been established to data mining and its evolution, 'Knowledge Discovery and Data Mining' (KDD). Data mining seeks to extract interesting patterns from data, but, until now, the patterns discovered from data have not always been 'actionable' for decision-makers in Socio-Technical Organizations (STO). With the evolution of the Internet and connectivity, STOs have evolved into Cyber-Physical and Social Systems (CPSS) that are known to describe our world today. In such complex and dynamic environments, the conventional KDD process is insufficient, and additional processes are required to transform complex data into actionable knowledge. Readers are presented with advanced knowledge concepts and the analytics and information fusion (AIF) processes aimed at delivering actionable knowledge. The authors provide an understanding of the concept of 'relation' and its exploitation, relational calculus, as well as the formalization of specific dimensions of knowledge that achieve a semantic growth along the AIF processes. This book serves as an important technical presentation of relational calculus and its application to processing chains in order to generate actionable knowledge. It is ideal for graduate students, researchers, or industry professionals interested in decision science and knowledge engineering.

Mathematical Modelling for Next-Generation Cryptography - CREST Crypto-Math Project (Hardcover, 1st ed. 2018): Tsuyoshi Takagi,... Mathematical Modelling for Next-Generation Cryptography - CREST Crypto-Math Project (Hardcover, 1st ed. 2018)
Tsuyoshi Takagi, Masato Wakayama, Keisuke Tanaka, Noboru Kunihiro, Kazufumi Kimoto, …
R4,090 Discovery Miles 40 900 Ships in 18 - 22 working days

This book presents the mathematical background underlying security modeling in the context of next-generation cryptography. By introducing new mathematical results in order to strengthen information security, while simultaneously presenting fresh insights and developing the respective areas of mathematics, it is the first-ever book to focus on areas that have not yet been fully exploited for cryptographic applications such as representation theory and mathematical physics, among others. Recent advances in cryptanalysis, brought about in particular by quantum computation and physical attacks on cryptographic devices, such as side-channel analysis or power analysis, have revealed the growing security risks for state-of-the-art cryptographic schemes. To address these risks, high-performance, next-generation cryptosystems must be studied, which requires the further development of the mathematical background of modern cryptography. More specifically, in order to avoid the security risks posed by adversaries with advanced attack capabilities, cryptosystems must be upgraded, which in turn relies on a wide range of mathematical theories. This book is suitable for use in an advanced graduate course in mathematical cryptography, while also offering a valuable reference guide for experts.

Proceedings of the 2nd Workshop on Communication Security - Cryptography and Physical Layer Security (Hardcover, 1st ed. 2018):... Proceedings of the 2nd Workshop on Communication Security - Cryptography and Physical Layer Security (Hardcover, 1st ed. 2018)
Marco Baldi, Stefano Tomasin, Elizabeth A. Quaglia
R4,858 R4,537 Discovery Miles 45 370 Save R321 (7%) Ships in 10 - 15 working days

This book focuses on techniques that can be applied at the physical and data-link layers of communication systems in order to secure transmissions against eavesdroppers. It discusses topics ranging from information theory-based security to coding for security and cryptography, and presents cutting-edge research and innovative findings from leading researchers. The characteristic feature of all the contributions in this book is their relevance for the practical application of security principles to a variety of widely used communication techniques, including: multiantenna systems, ultra-wide-band communication systems, power line communications, and quantum key distribution techniques. A further distinctive aspect is the attention paid to both unconditional and computational security techniques, building a bridge between two usually distinct worlds. The book gathers extended versions of contributions delivered at the Second Workshop on Communication Security, held in Paris, France, in April 2017 and affiliated with the conference EUROCRYPT 2017.

Machine Learning on Commodity Tiny Devices - Theory and Practice (Hardcover): Song Guo, Qihua Zhou Machine Learning on Commodity Tiny Devices - Theory and Practice (Hardcover)
Song Guo, Qihua Zhou
R2,301 Discovery Miles 23 010 Ships in 10 - 15 working days

This book aims at the tiny machine learning (TinyML) software and hardware synergy for edge intelligence applications. This book presents on-device learning techniques covering model-level neural network design, algorithm-level training optimization and hardware-level instruction acceleration. Analyzing the limitations of conventional in-cloud computing would reveal that on-device learning is a promising research direction to meet the requirements of edge intelligence applications. As to the cutting-edge research of TinyML, implementing a high-efficiency learning framework and enabling system-level acceleration is one of the most fundamental issues. This book presents a comprehensive discussion of the latest research progress and provides system-level insights on designing TinyML frameworks, including neural network design, training algorithm optimization and domain-specific hardware acceleration. It identifies the main challenges when deploying TinyML tasks in the real world and guides the researchers to deploy a reliable learning system. This book will be of interest to students and scholars in the field of edge intelligence, especially to those with sufficient professional Edge AI skills. It will also be an excellent guide for researchers to implement high-performance TinyML systems.

Artificial Intelligence Technologies for Computational Biology (Hardcover): Ranjeet Kumar Rout, Saiyed Umer, Sabha Sheikh,... Artificial Intelligence Technologies for Computational Biology (Hardcover)
Ranjeet Kumar Rout, Saiyed Umer, Sabha Sheikh, Amrit Lal Sangal
R3,807 Discovery Miles 38 070 Ships in 10 - 15 working days

This text emphasizes the importance of artificial intelligence techniques in the field of biological computation. It also discusses fundamental principles that can be applied beyond bio-inspired computing. It comprehensively covers important topics including data integration, data mining, machine learning, genetic algorithms, evolutionary computation, evolved neural networks, nature-inspired algorithms, and protein structure alignment. The text covers the application of evolutionary computations for fractal visualization of sequence data, artificial intelligence, and automatic image interpretation in modern biological systems. The text is primarily written for graduate students and academic researchers in areas of electrical engineering, electronics engineering, computer engineering, and computational biology. This book: * Covers algorithms in the fields of artificial intelligence, and machine learning useful in biological data analysis. * Discusses comprehensively artificial intelligence and automatic image interpretation in modern biological systems. * Presents the application of evolutionary computations for fractal visualization of sequence data. * Explores the use of genetic algorithms for pair-wise and multiple sequence alignments. * Examines the roles of efficient computational techniques in biology.

GPU-based Parallel Implementation of Swarm Intelligence Algorithms (Paperback): Ying Tan GPU-based Parallel Implementation of Swarm Intelligence Algorithms (Paperback)
Ying Tan
R2,065 Discovery Miles 20 650 Ships in 10 - 15 working days

GPU-based Parallel Implementation of Swarm Intelligence Algorithms combines and covers two emerging areas attracting increased attention and applications: graphics processing units (GPUs) for general-purpose computing (GPGPU) and swarm intelligence. This book not only presents GPGPU in adequate detail, but also includes guidance on the appropriate implementation of swarm intelligence algorithms on the GPU platform. GPU-based implementations of several typical swarm intelligence algorithms such as PSO, FWA, GA, DE, and ACO are presented and having described the implementation details including parallel models, implementation considerations as well as performance metrics are discussed. Finally, several typical applications of GPU-based swarm intelligence algorithms are presented. This valuable reference book provides a unique perspective not possible by studying either GPGPU or swarm intelligence alone. This book gives a complete and whole picture for interested readers and new comers who will find many implementation algorithms in the book suitable for immediate use in their projects. Additionally, some algorithms can also be used as a starting point for further research.

Nature-Inspired Algorithms - For Engineers and Scientists (Hardcover): Krishn Kumar Mishra Nature-Inspired Algorithms - For Engineers and Scientists (Hardcover)
Krishn Kumar Mishra
R3,794 Discovery Miles 37 940 Ships in 10 - 15 working days

This comprehensive reference text discusses nature inspired algorithms and their applications. It presents the methodology to write new algorithms with the help of MATLAB programs and instructions for better understanding of concepts. It covers well-known algorithms including evolutionary algorithms, genetic algorithm, particle Swarm optimization and differential evolution, and recent approached including gray wolf optimization. A separate chapter discusses test case generation using techniques such as particle swarm optimization, genetic algorithm, and differential evolution algorithm. The book- Discusses in detail various nature inspired algorithms and their applications Provides MATLAB programs for the corresponding algorithm Presents methodology to write new algorithms Examines well-known algorithms like the genetic algorithm, particle swarm optimization and differential evolution, and recent approaches like gray wolf optimization. Provides conceptual linking of algorithms with theoretical concepts The text will be useful for graduate students in the field of electrical engineering, electronics engineering, computer science and engineering. Discussing nature inspired algorithms and their applications in a single volume, this text will be useful as a reference text for graduate students in the field of electrical engineering, electronics engineering, computer science and engineering. It discusses important algorithms including deterministic algorithms, randomized algorithms, evolutionary algorithms, particle swarm optimization, big bang big crunch (BB-BC) algorithm, genetic algorithm and grey wolf optimization algorithm. "

Progress in Industrial Mathematics at ECMI 2018 (Hardcover, 1st ed. 2019): Istvan Farago, Ferenc Izsak, Peter L Simon Progress in Industrial Mathematics at ECMI 2018 (Hardcover, 1st ed. 2019)
Istvan Farago, Ferenc Izsak, Peter L Simon
R5,272 Discovery Miles 52 720 Ships in 18 - 22 working days

This book explores mathematics in a wide variety of applications, ranging from problems in electronics, energy and the environment, to mechanics and mechatronics. The book gathers 81 contributions submitted to the 20th European Conference on Mathematics for Industry, ECMI 2018, which was held in Budapest, Hungary in June 2018. The application areas include: Applied Physics, Biology and Medicine, Cybersecurity, Data Science, Economics, Finance and Insurance, Energy, Production Systems, Social Challenges, and Vehicles and Transportation. In turn, the mathematical technologies discussed include: Combinatorial Optimization, Cooperative Games, Delay Differential Equations, Finite Elements, Hamilton-Jacobi Equations, Impulsive Control, Information Theory and Statistics, Inverse Problems, Machine Learning, Point Processes, Reaction-Diffusion Equations, Risk Processes, Scheduling Theory, Semidefinite Programming, Stochastic Approximation, Spatial Processes, System Identification, and Wavelets. The goal of the European Consortium for Mathematics in Industry (ECMI) conference series is to promote interaction between academia and industry, leading to innovations in both fields. These events have attracted leading experts from business, science and academia, and have promoted the application of novel mathematical technologies to industry. They have also encouraged industrial sectors to share challenging problems where mathematicians can provide fresh insights and perspectives. Lastly, the ECMI conferences are one of the main forums in which significant advances in industrial mathematics are presented, bringing together prominent figures from business, science and academia to promote the use of innovative mathematics in industry.

Mechanizing Hypothesis Formation - Principles and Case Studies (Hardcover): Jan Rauch, Milan Simunek, David Chudan, Petr Masa Mechanizing Hypothesis Formation - Principles and Case Studies (Hardcover)
Jan Rauch, Milan Simunek, David Chudan, Petr Masa
R4,939 Discovery Miles 49 390 Ships in 10 - 15 working days

Introduces the GUHA method of mechanizing hypothesis formation as a data mining tool. Presents examples of data mining with enhanced association rules, histograms, contingency tables and action rules. Provides examples of data mining for exception rules and examples of subgroups discovery. Outlines possibilities of GUHA in business intelligence and big data. Overviews related theoretical results and challenges related to mechanizing hypothesis formation.

Modern Cryptography Primer - Theoretical Foundations and Practical Applications (Hardcover, 2013 ed.): Czeslaw Koscielny,... Modern Cryptography Primer - Theoretical Foundations and Practical Applications (Hardcover, 2013 ed.)
Czeslaw Koscielny, Miroslaw Kurkowski, Marian Srebrny
R2,544 Discovery Miles 25 440 Ships in 10 - 15 working days

Cryptography has experienced rapid development, with major advances recently in both secret and public key ciphers, cryptographic hash functions, cryptographic algorithms and multiparty protocols, including their software engineering correctness verification, and various methods of cryptanalysis. This textbook introduces the reader to these areas, offering an understanding of the essential, most important, and most interesting ideas, based on the authors' teaching and research experience.

After introducing the basic mathematical and computational complexity concepts, and some historical context, including the story of Enigma, the authors explain symmetric and asymmetric cryptography, electronic signatures and hash functions, PGP systems, public key infrastructures, cryptographic protocols, and applications in network security. In each case the text presents the key technologies, algorithms, and protocols, along with methods of design and analysis, while the content is characterized by a visual style and all algorithms are presented in readable pseudocode or using simple graphics and diagrams.

The book is suitable for undergraduate and graduate courses in computer science and engineering, particularly in the area of networking, and it is also a suitable reference text for self-study by practitioners and researchers. The authors assume only basic elementary mathematical experience, the text covers the foundational mathematics and computational complexity theory.

Programming for Engineers - A Foundational Approach to Learning C and Matlab (Hardcover, 2011): Aaron R. Bradley Programming for Engineers - A Foundational Approach to Learning C and Matlab (Hardcover, 2011)
Aaron R. Bradley
R1,894 Discovery Miles 18 940 Ships in 10 - 15 working days

To learn to program is to be initiated into an entirely new way of thinking about engineering, mathematics, and the world in general. Computation is integral to all modern engineering disciplines, so the better you are at programming, the better you will be in your chosen field.

The author departs radically from the typical presentation by teaching concepts and techniques in a rigorous manner rather than listing how to use libraries and functions. He presents pointers in the very first chapter as part of the development of a computational model that facilitates an ab initio presentation of subjects such as function calls, call-by-reference, arrays, the stack, and the heap. The model also allows students to practice the essential skill of memory manipulation throughout the entire course rather than just at the end. As a result, this textbook goes further than is typical for a one-semester course -- abstract data types and linked lists, for example, are covered in depth. The computational model will also serve students in their adventures with programming beyond the course: instead of falling back on rules, they can think through the model to decide how a new programming concept fits with what they already know.

The book is appropriate for undergraduate students of engineering and computer science, and graduate students of other disciplines. It contains many exercises integrated into the main text, and the author has made the source code available online.

Algorithms on Strings (Hardcover): Maxime Crochemore, Christophe Hancart, Thierry Lecroq Algorithms on Strings (Hardcover)
Maxime Crochemore, Christophe Hancart, Thierry Lecroq
R4,328 R3,646 Discovery Miles 36 460 Save R682 (16%) Ships in 10 - 15 working days

The book is intended for lectures on string processes and pattern matching in Master's courses of computer science and software engineering curricula. The details of algorithms are given with correctness proofs and complexity analysis, which make them ready to implement. Algorithms are described in a C-like language. The book is also a reference for students in computational linguistics or computational biology. It presents examples of questions related to the automatic processing of natural language, to the analysis of molecular sequences, and to the management of textual databases.

Swarm Intelligence and Machine Learning - Applications in Healthcare (Hardcover): Manish Gupta, Jitendra Agrawal, Dac-Nhuong... Swarm Intelligence and Machine Learning - Applications in Healthcare (Hardcover)
Manish Gupta, Jitendra Agrawal, Dac-Nhuong Le, Shikha Agarwal
R4,638 Discovery Miles 46 380 Ships in 10 - 15 working days

Highlights the importance and applications of Swarm Intelligence and Machine learning in Healthcare industry. Elaborates Swarm Intelligence and Machine Learning for Cancer Detection. Focuses on applying Swarm Intelligence and Machine Learning for Heart Disease detection and diagnosis. Explores of the concepts of machine learning along with swarm intelligence techniques, along with recent research developments in healthcare sectors. Investigates how healthcare companies can leverage the tapestry of big data to discover new business values. Provides a strong foundation for Diabetic Retinopathy detection using Swarm and Evolutionary algorithms.

A Comprehensive Guide to Information Security Management and Audit (Hardcover): Rajkumar Banoth, Gugulothu Narsimha, Aruna... A Comprehensive Guide to Information Security Management and Audit (Hardcover)
Rajkumar Banoth, Gugulothu Narsimha, Aruna Kranthi Godishala
R3,646 Discovery Miles 36 460 Ships in 10 - 15 working days

The text is written to provide readers with a comprehensive study of information security and management system, audit planning and preparation, audit techniques and collecting evidence, international information security (ISO) standard 27001, and asset management. It further discusses important topics such as security mechanisms, security standards, audit principles, audit competence and evaluation methods, and the principles of asset management. It will serve as an ideal reference text for senior undergraduate, graduate students, and researchers in fields including electrical engineering, electronics and communications engineering, computer engineering, and information technology. The book explores information security concepts and applications from an organizational information perspective and explains the process of audit planning and preparation. It further demonstrates audit techniques and collecting evidence to write important documentation by following the ISO 27001 standards. The book: Elaborates on the application of confidentiality, integrity, and availability (CIA) in the area of audit planning and preparation Covers topics such as managing business assets, agreements on how to deal with business assets, and media handling Demonstrates audit techniques and collects evidence to write the important documentation by following the ISO 27001 standards Explains how the organization's assets are managed by asset management, and access control policies Presents seven case studies

Introduction to Cryptography - Principles and Applications (Hardcover, 3rd ed. 2015): Hans Delfs, Helmut Knebl Introduction to Cryptography - Principles and Applications (Hardcover, 3rd ed. 2015)
Hans Delfs, Helmut Knebl
R2,680 Discovery Miles 26 800 Ships in 10 - 15 working days

The first part of this book covers the key concepts of cryptography on an undergraduate level, from encryption and digital signatures to cryptographic protocols. Essential techniques are demonstrated in protocols for key exchange, user identification, electronic elections and digital cash. In the second part, more advanced topics are addressed, such as the bit security of one-way functions and computationally perfect pseudorandom bit generators. The security of cryptographic schemes is a central topic. Typical examples of provably secure encryption and signature schemes and their security proofs are given. Though particular attention is given to the mathematical foundations, no special background in mathematics is presumed. The necessary algebra, number theory and probability theory are included in the appendix. Each chapter closes with a collection of exercises. In the second edition the authors added a complete description of the AES, an extended section on cryptographic hash functions, and new sections on random oracle proofs and public-key encryption schemes that are provably secure against adaptively-chosen-ciphertext attacks. The third edition is a further substantive extension, with new topics added, including: elliptic curve cryptography; Paillier encryption; quantum cryptography; the new SHA-3 standard for cryptographic hash functions; a considerably extended section on electronic elections and Internet voting; mix nets; and zero-knowledge proofs of shuffles. The book is appropriate for undergraduate and graduate students in computer science, mathematics, and engineering.

Algorithms and Order (Hardcover, 1989 ed.): Ivan Rival Algorithms and Order (Hardcover, 1989 ed.)
Ivan Rival
R10,376 Discovery Miles 103 760 Ships in 18 - 22 working days

This volume contains the texts of the principal survey papers presented at ALGORITHMS -and ORDER, held. at Ottawa, Canada from June 1 to June 12, 1987. The conference was supported by grants from the N.A.T.O. Advanced Study Institute programme, the University of Ottawa, and the Natural Sciences and Engineering Research Council of Canada. We are grateful for this considerable support. Over fifty years ago, the Symposium on Lattice Theory, in Charlottesville, U.S.A., proclaimed the vitality of ordered sets. Only twenty years later the Symposium on Partially Ordered Sets and Lattice Theory, held at Monterey, U.S.A., had solved many of the problems that had been originally posed. In 1981, the Symposium on Ordered Sets held at Banff, Canada, continued this tradition. It was marked by a landmark volume containing twenty-three articles on almost all current topics in the theory of ordered sets and its applications. Three years after, Graphs and Orders, also held at Banff, Canada, aimed to document the role of graphs in the theory of ordered sets and its applications. Because of its special place in the landscape of the mathematical sciences order is especially sensitive to new trends and developments. Today, the most important current in the theory and application of order springs from theoretical computer seience. Two themes of computer science lead the way. The first is data structure. Order is common to data structures."

Handbook of Moth-Flame Optimization Algorithm - Variants, Hybrids, Improvements, and Applications (Hardcover): Seyed Ali... Handbook of Moth-Flame Optimization Algorithm - Variants, Hybrids, Improvements, and Applications (Hardcover)
Seyed Ali Mirjalili
R3,102 Discovery Miles 31 020 Ships in 10 - 15 working days

Reviews the literature of the Moth-Flame Optimization algorithm; Provides an in-depth analysis of equations, mathematical models, and mechanisms of the Moth-Flame Optimization algorithm; Proposes different variants of the Moth-Flame Optimization algorithm to solve binary, multi-objective, noisy, dynamic, and combinatorial optimization problems; Demonstrates how to design, develop, and test different hybrids of Moth-Flame Optimization algorithm; Introduces several applications areas of the Moth-Flame Optimization algorithm focusing in sustainability.

Data-Driven Evolutionary Modeling in Materials Technology (Hardcover): Nirupam Chakraborti Data-Driven Evolutionary Modeling in Materials Technology (Hardcover)
Nirupam Chakraborti
R5,074 Discovery Miles 50 740 Ships in 10 - 15 working days

Due to efficacy and optimization potential of genetic and evolutionary algorithms, they are used in learning and modeling especially with the advent of big data related problems. This book presents the algorithms and strategies specifically associated with pertinent issues in materials science domain. It discusses the procedures for evolutionary multi-objective optimization of objective functions created through these procedures and introduces available codes. Recent applications ranging from primary metal production to materials design are covered. It also describes hybrid modeling strategy, and other common modeling and simulation strategies like molecular dynamics, cellular automata etc. Features: Focuses on data-driven evolutionary modeling and optimization, including evolutionary deep learning. Include details on both algorithms and their applications in materials science and technology. Discusses hybrid data-driven modeling that couples evolutionary algorithms with generic computing strategies. Thoroughly discusses applications of pertinent strategies in metallurgy and materials. Provides overview of the major single and multi-objective evolutionary algorithms. This book aims at Researchers, Professionals, and Graduate students in Materials Science, Data-Driven Engineering, Metallurgical Engineering, Computational Materials Science, Structural Materials, and Functional Materials.

Computational and Statistical Methods for Analysing Big Data with Applications (Hardcover): Shen Liu, James McGree, Zongyuan... Computational and Statistical Methods for Analysing Big Data with Applications (Hardcover)
Shen Liu, James McGree, Zongyuan Ge, Yang Xie
R1,802 Discovery Miles 18 020 Ships in 10 - 15 working days

Due to the scale and complexity of data sets currently being collected in areas such as health, transportation, environmental science, engineering, information technology, business and finance, modern quantitative analysts are seeking improved and appropriate computational and statistical methods to explore, model and draw inferences from big data. This book aims to introduce suitable approaches for such endeavours, providing applications and case studies for the purpose of demonstration. Computational and Statistical Methods for Analysing Big Data with Applications starts with an overview of the era of big data. It then goes onto explain the computational and statistical methods which have been commonly applied in the big data revolution. For each of these methods, an example is provided as a guide to its application. Five case studies are presented next, focusing on computer vision with massive training data, spatial data analysis, advanced experimental design methods for big data, big data in clinical medicine, and analysing data collected from mobile devices, respectively. The book concludes with some final thoughts and suggested areas for future research in big data.

Tensor Eigenvalues and Their Applications (Hardcover, 1st ed. 2018): Liqun Qi, Haibin Chen, Yannan Chen Tensor Eigenvalues and Their Applications (Hardcover, 1st ed. 2018)
Liqun Qi, Haibin Chen, Yannan Chen
R4,000 Discovery Miles 40 000 Ships in 10 - 15 working days

This book offers an introduction to applications prompted by tensor analysis, especially by the spectral tensor theory developed in recent years. It covers applications of tensor eigenvalues in multilinear systems, exponential data fitting, tensor complementarity problems, and tensor eigenvalue complementarity problems. It also addresses higher-order diffusion tensor imaging, third-order symmetric and traceless tensors in liquid crystals, piezoelectric tensors, strong ellipticity for elasticity tensors, and higher-order tensors in quantum physics. This book is a valuable reference resource for researchers and graduate students who are interested in applications of tensor eigenvalues.

Code Breaking in the Pacific (Hardcover, 2014 ed.): Peter Donovan, John Mack Code Breaking in the Pacific (Hardcover, 2014 ed.)
Peter Donovan, John Mack
R4,008 Discovery Miles 40 080 Ships in 10 - 15 working days

This book reveals the historical context and the evolution of the technically complex Allied Signals Intelligence (Sigint) activity against Japan from 1920 to 1945. It traces the all-important genesis and development of the cryptanalytic techniques used to break the main Japanese Navy code (JN-25) and the Japanese Army s Water Transport Code during WWII. This is the first book to describe, explain and analyze the code breaking techniques developed and used to provide this intelligence, thus closing the sole remaining gap in the published accounts of the Pacific War. The authors also explore the organization of cryptographic teams and issues of security, censorship, and leaks. Correcting gaps in previous research, this book illustrates how Sigint remained crucial to Allied planning throughout the war. It helped direct the advance to the Philippines from New Guinea, the sea battles and the submarine onslaught on merchant shipping. Written by well-known authorities on the history of cryptography and mathematics, Code Breaking in the Pacific is designed for cryptologists, mathematicians and researchers working in communications security. Advanced-level students interested in cryptology, the history of the Pacific War, mathematics or the history of computing will also find this book a valuable resource."

Advanced Applications of Computational Mathematics (Hardcover): Akshay Kumar, Mangey Ram, Hari Mohan Srivastava Advanced Applications of Computational Mathematics (Hardcover)
Akshay Kumar, Mangey Ram, Hari Mohan Srivastava
R3,080 Discovery Miles 30 800 Ships in 10 - 15 working days

This book "Advanced Applications of Computational Mathematics" covers multidisciplinary studies containing advanced research in the field of computational and applied mathematics. The book includes research methodology, techniques, applications, and algorithms. The book will be very useful to advanced students, researchers and practitioners who are involved in the areas of computational and applied mathematics and engineering.

Introduction to Engineering and Scientific Computing with Python (Hardcover): David E. Clough, Steven C. Chapra Introduction to Engineering and Scientific Computing with Python (Hardcover)
David E. Clough, Steven C. Chapra
R3,112 Discovery Miles 31 120 Ships in 10 - 15 working days

1) Provides a levelling approach, bringing students at all stages of programming experience to the same point 2) Focuses Python, a general language, to an engineering and scientific context 3) Uses a classroom tested, practical approach to teaching programming 4) Teaches students and professionals how to use Python to solve engineering calculations such as differential and algebraic equations

Coded Leadership - Developing Scalable Management in an AI-induced Quantum World (Hardcover): Pinisetti Swami Sairam,... Coded Leadership - Developing Scalable Management in an AI-induced Quantum World (Hardcover)
Pinisetti Swami Sairam, Hemachandran K, Raul Villamarin Rodriguez
R2,452 Discovery Miles 24 520 Ships in 10 - 15 working days

Introduction to Quantum Natural Language Processing. Overview of Leadership and AI. The Age of Quantum Superiority. Challenges To Today's Leadership. AI-induced Strategic Implementation and Organizational Performance.

Port Automation and Vehicle Scheduling - Advanced Algorithms for Scheduling Problems of AGVs (Hardcover, 3rd edition): Hassan... Port Automation and Vehicle Scheduling - Advanced Algorithms for Scheduling Problems of AGVs (Hardcover, 3rd edition)
Hassan Rashidi, Edward P K Tsang
R3,520 Discovery Miles 35 200 Ships in 10 - 15 working days

Classifies the optimization problems of the ports into five scheduling decisions. For each decision, it supplies an overview, formulates each of the decisions as constraint satisfaction and optimization problems, and then covers possible solutions, implementation, and performance. Part One explores the various optimization problems in modern container terminals, while Part Two details advanced algorithms for the minimum cost flow (MCF) problem and for the scheduling problem of AGVs in ports. A complete package that can help readers address the scheduling problems of AGVs in ports.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Aircraft of the Special Forces
Edward Ward Hardcover R505 R456 Discovery Miles 4 560
Machine Learning in Python - Hands on…
Bob Mather Hardcover R799 Discovery Miles 7 990
Entity-Oriented Search
Krisztian Balog Hardcover R1,549 Discovery Miles 15 490
New Opportunities for Sentiment Analysis…
Aakanksha Sharaff, G. R. Sinha, … Hardcover R6,648 Discovery Miles 66 480
AI R&D in Asia - A snapshot of AI…
David K. Kahaner Hardcover R2,361 Discovery Miles 23 610
The Hundred-Page Machine Learning Book
Andriy Burkov Hardcover R1,193 Discovery Miles 11 930
Deep Learning and Neural Networks…
Information Reso Management Association Hardcover R10,324 Discovery Miles 103 240
Evolution Continues - A Human-Computer…
William Meisel Hardcover R583 Discovery Miles 5 830
Dynamic Synapse Protocol
Stuart Warren Hardcover R760 R712 Discovery Miles 7 120
Machine Learning and Data Mining
I Kononenko, M Kukar Paperback R1,903 Discovery Miles 19 030

 

Partners