0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (4)
  • R250 - R500 (50)
  • R500+ (5,324)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer programming > Algorithms & procedures

Distributed Real-Time Systems - Theory and Practice (Hardcover, 1st ed. 2019): K. Erciyes Distributed Real-Time Systems - Theory and Practice (Hardcover, 1st ed. 2019)
K. Erciyes
R2,132 Discovery Miles 21 320 Ships in 18 - 22 working days

This classroom-tested textbook describes the design and implementation of software for distributed real-time systems, using a bottom-up approach. The text addresses common challenges faced in software projects involving real-time systems, and presents a novel method for simply and effectively performing all of the software engineering steps. Each chapter opens with a discussion of the core concepts, together with a review of the relevant methods and available software. This is then followed with a description of the implementation of the concepts in a sample kernel, complete with executable code. Topics and features: introduces the fundamentals of real-time systems, including real-time architecture and distributed real-time systems; presents a focus on the real-time operating system, covering the concepts of task, memory, and input/output management; provides a detailed step-by-step construction of a real-time operating system kernel, which is then used to test various higher level implementations; describes periodic and aperiodic scheduling, resource management, and distributed scheduling; reviews the process of application design from high-level design methods to low-level details of design and implementation; surveys real-time programming languages and fault tolerance techniques; includes end-of-chapter review questions, extensive C code, numerous examples, and a case study implementing the methods in real-world applications; supplies additional material at an associated website. Requiring only a basic background in computer architecture and operating systems, this practically-oriented work is an invaluable study aid for senior undergraduate and graduate-level students of electrical and computer engineering, and computer science. The text will also serve as a useful general reference for researchers interested in real-time systems.

Research Anthology on Multi-Industry Uses of Genetic Programming and Algorithms, VOL 3 (Hardcover): Information Reso Management... Research Anthology on Multi-Industry Uses of Genetic Programming and Algorithms, VOL 3 (Hardcover)
Information Reso Management Association
R12,408 Discovery Miles 124 080 Ships in 18 - 22 working days
Glowworm Swarm Optimization - Theory, Algorithms, and Applications (Hardcover, 1st ed. 2017): Krishnanand N. Kaipa, Debasish... Glowworm Swarm Optimization - Theory, Algorithms, and Applications (Hardcover, 1st ed. 2017)
Krishnanand N. Kaipa, Debasish Ghose
R3,906 R3,376 Discovery Miles 33 760 Save R530 (14%) Ships in 10 - 15 working days

This book provides a comprehensive account of the glowworm swarm optimization (GSO) algorithm, including details of the underlying ideas, theoretical foundations, algorithm development, various applications, and MATLAB programs for the basic GSO algorithm. It also discusses several research problems at different levels of sophistication that can be attempted by interested researchers. The generality of the GSO algorithm is evident in its application to diverse problems ranging from optimization to robotics. Examples include computation of multiple optima, annual crop planning, cooperative exploration, distributed search, multiple source localization, contaminant boundary mapping, wireless sensor networks, clustering, knapsack, numerical integration, solving fixed point equations, solving systems of nonlinear equations, and engineering design optimization. The book is a valuable resource for researchers as well as graduate and undergraduate students in the area of swarm intelligence and computational intelligence and working on these topics.

PLD Based Design with VHDL - RTL Design, Synthesis and Implementation (Hardcover, 1st ed. 2017): Vaibbhav Taraate PLD Based Design with VHDL - RTL Design, Synthesis and Implementation (Hardcover, 1st ed. 2017)
Vaibbhav Taraate
R5,819 Discovery Miles 58 190 Ships in 10 - 15 working days

This book covers basic fundamentals of logic design and advanced RTL design concepts using VHDL. The book is organized to describe both simple and complex RTL design scenarios using VHDL. It gives practical information on the issues in ASIC prototyping using FPGAs, design challenges and how to overcome practical issues and concerns. It describes how to write an efficient RTL code using VHDL and how to improve the design performance. The design guidelines by using VHDL are also explained with the practical examples in this book. The book also covers the ALTERA and XILINX FPGA architecture and the design flow for the PLDs. The contents of this book will be useful to students, researchers, and professionals working in hardware design and optimization. The book can also be used as a text for graduate and professional development courses.

What's Where in the APPLE - Enhanced Edition - A Complete Guide to the Apple II Computer (Hardcover): Bill Martens, Brian... What's Where in the APPLE - Enhanced Edition - A Complete Guide to the Apple II Computer (Hardcover)
Bill Martens, Brian Wiser, William F Luebbert
R1,754 Discovery Miles 17 540 Ships in 10 - 15 working days
Multivariate Time Series With Linear State Space Structure (Hardcover, 1st ed. 2016): Victor Gomez Multivariate Time Series With Linear State Space Structure (Hardcover, 1st ed. 2016)
Victor Gomez
R3,682 Discovery Miles 36 820 Ships in 10 - 15 working days

This book presents a comprehensive study of multivariate time series with linear state space structure. The emphasis is put on both the clarity of the theoretical concepts and on efficient algorithms for implementing the theory. In particular, it investigates the relationship between VARMA and state space models, including canonical forms. It also highlights the relationship between Wiener-Kolmogorov and Kalman filtering both with an infinite and a finite sample. The strength of the book also lies in the numerous algorithms included for state space models that take advantage of the recursive nature of the models. Many of these algorithms can be made robust, fast, reliable and efficient. The book is accompanied by a MATLAB package called SSMMATLAB and a webpage presenting implemented algorithms with many examples and case studies. Though it lays a solid theoretical foundation, the book also focuses on practical application, and includes exercises in each chapter. It is intended for researchers and students working with linear state space models, and who are familiar with linear algebra and possess some knowledge of statistics.

Evolutionary Multi-Agent Systems - From Inspirations to Applications (Hardcover, 1st ed. 2017): Aleksander Byrski, Marek... Evolutionary Multi-Agent Systems - From Inspirations to Applications (Hardcover, 1st ed. 2017)
Aleksander Byrski, Marek Kisiel-Dorohinicki
R4,287 Discovery Miles 42 870 Ships in 10 - 15 working days

This book addresses agent-based computing, concentrating in particular on evolutionary multi-agent systems (EMAS), which have been developed since 1996 at the AGH University of Science and Technology in Cracow, Poland. It provides the relevant background information on and a detailed description of this computing paradigm, along with key experimental results. Readers will benefit from the insightful discussion, which primarily concerns the efficient implementation of computing frameworks for developing EMAS and similar computing systems, as well as a detailed formal model. Theoretical deliberations demonstrating that computing with EMAS always helps to find the optimal solution are also included, rounding out the coverage.

Proceedings of ELM-2015 Volume 1 - Theory, Algorithms and Applications (I) (Hardcover, 1st ed. 2016): Jiuwen Cao, Kezhi Mao,... Proceedings of ELM-2015 Volume 1 - Theory, Algorithms and Applications (I) (Hardcover, 1st ed. 2016)
Jiuwen Cao, Kezhi Mao, Jonathan Wu, Amaury Lendasse
R7,438 R6,567 Discovery Miles 65 670 Save R871 (12%) Ships in 10 - 15 working days

This book contains some selected papers from the International Conference on Extreme Learning Machine 2015, which was held in Hangzhou, China, December 15-17, 2015. This conference brought together researchers and engineers to share and exchange R&D experience on both theoretical studies and practical applications of the Extreme Learning Machine (ELM) technique and brain learning. This book covers theories, algorithms ad applications of ELM. It gives readers a glance of the most recent advances of ELM.

Advances in Intelligent Computing (Hardcover, 1st ed. 2019): J K Mandal, Paramartha Dutta, Somnath Mukhopadhyay Advances in Intelligent Computing (Hardcover, 1st ed. 2019)
J K Mandal, Paramartha Dutta, Somnath Mukhopadhyay
R3,106 Discovery Miles 31 060 Ships in 18 - 22 working days

This edited volume on computational intelligence algorithms-based applications includes work presented at the International Conference on Computational Intelligence, Communications, and Business Analytics (CICBA 2017). It provides the latest research findings on the significance of computational intelligence and related application areas. It also introduces various computation platforms involving evolutionary algorithms, fuzzy logic, swarm intelligence, artificial neural networks and several other tools for solving real-world problems. It also discusses various tools that are hybrids of more than one solution framework, highlighting the theoretical aspects as well as various real-world applications.

Advanced HDL Synthesis and SOC Prototyping - RTL Design Using Verilog (Hardcover, 1st ed. 2019): Vaibbhav Taraate Advanced HDL Synthesis and SOC Prototyping - RTL Design Using Verilog (Hardcover, 1st ed. 2019)
Vaibbhav Taraate
R4,644 Discovery Miles 46 440 Ships in 10 - 15 working days

This book describes RTL design using Verilog, synthesis and timing closure for System On Chip (SOC) design blocks. It covers the complex RTL design scenarios and challenges for SOC designs and provides practical information on performance improvements in SOC, as well as Application Specific Integrated Circuit (ASIC) designs. Prototyping using modern high density Field Programmable Gate Arrays (FPGAs) is discussed in this book with the practical examples and case studies. The book discusses SOC design, performance improvement techniques, testing and system level verification, while also describing the modern Intel FPGA/XILINX FPGA architectures and their use in SOC prototyping. Further, the book covers the Synopsys Design Compiler (DC) and Prime Time (PT) commands, and how they can be used to optimize complex ASIC/SOC designs. The contents of this book will be useful to students and professionals alike.

Grouping Genetic Algorithms - Advances and Applications (Hardcover, 1st ed. 2017): Michael Mutingi, Charles Mbohwa Grouping Genetic Algorithms - Advances and Applications (Hardcover, 1st ed. 2017)
Michael Mutingi, Charles Mbohwa
R4,326 Discovery Miles 43 260 Ships in 10 - 15 working days

This book presents advances and innovations in grouping genetic algorithms, enriched with new and unique heuristic optimization techniques. These algorithms are specially designed for solving industrial grouping problems where system entities are to be partitioned or clustered into efficient groups according to a set of guiding decision criteria. Examples of such problems are: vehicle routing problems, team formation problems, timetabling problems, assembly line balancing, group maintenance planning, modular design, and task assignment. A wide range of industrial grouping problems, drawn from diverse fields such as logistics, supply chain management, project management, manufacturing systems, engineering design and healthcare, are presented. Typical complex industrial grouping problems, with multiple decision criteria and constraints, are clearly described using illustrative diagrams and formulations. The problems are mapped into a common group structure that can conveniently be used as an input scheme to specific variants of grouping genetic algorithms. Unique heuristic grouping techniques are developed to handle grouping problems efficiently and effectively. Illustrative examples and computational results are presented in tables and graphs to demonstrate the efficiency and effectiveness of the algorithms. Researchers, decision analysts, software developers, and graduate students from various disciplines will find this in-depth reader-friendly exposition of advances and applications of grouping genetic algorithms an interesting, informative and valuable resource.

Automated Workflow Scheduling in Self-Adaptive Clouds - Concepts, Algorithms and Methods (Hardcover, 1st ed. 2017): G.... Automated Workflow Scheduling in Self-Adaptive Clouds - Concepts, Algorithms and Methods (Hardcover, 1st ed. 2017)
G. Kousalya, P. Balakrishnan, C. Pethuru Raj
R1,600 Discovery Miles 16 000 Ships in 10 - 15 working days

This timely text/reference presents a comprehensive review of the workflow scheduling algorithms and approaches that are rapidly becoming essential for a range of software applications, due to their ability to efficiently leverage diverse and distributed cloud resources. Particular emphasis is placed on how workflow-based automation in software-defined cloud centers and hybrid IT systems can significantly enhance resource utilization and optimize energy efficiency. Topics and features: describes dynamic workflow and task scheduling techniques that work across multiple (on-premise and off-premise) clouds; presents simulation-based case studies, and details of real-time test bed-based implementations; offers analyses and comparisons of a broad selection of static and dynamic workflow algorithms; examines the considerations for the main parameters in projects limited by budget and time constraints; covers workflow management systems, workflow modeling and simulation techniques, and machine learning approaches for predictive workflow analytics. This must-read work provides invaluable practical insights from three subject matter experts in the cloud paradigm, which will empower IT practitioners and industry professionals in their daily assignments. Researchers and students interested in next-generation software-defined cloud environments will also greatly benefit from the material in the book.

Personalized Privacy Protection in Big Data (Hardcover, 1st ed. 2021): Youyang Qu, Mohammad  Reza Nosouhi, Lei Cui, Shui Yu Personalized Privacy Protection in Big Data (Hardcover, 1st ed. 2021)
Youyang Qu, Mohammad Reza Nosouhi, Lei Cui, Shui Yu
R1,738 Discovery Miles 17 380 Ships in 18 - 22 working days

This book presents the data privacy protection which has been extensively applied in our current era of big data. However, research into big data privacy is still in its infancy. Given the fact that existing protection methods can result in low data utility and unbalanced trade-offs, personalized privacy protection has become a rapidly expanding research topic.In this book, the authors explore emerging threats and existing privacy protection methods, and discuss in detail both the advantages and disadvantages of personalized privacy protection. Traditional methods, such as differential privacy and cryptography, are discussed using a comparative and intersectional approach, and are contrasted with emerging methods like federated learning and generative adversarial nets. The advances discussed cover various applications, e.g. cyber-physical systems, social networks, and location-based services. Given its scope, the book is of interest to scientists, policy-makers, researchers, and postgraduates alike.

Analysis and Enumeration - Algorithms for Biological Graphs (Hardcover, 2015 ed.): Andrea Marino Analysis and Enumeration - Algorithms for Biological Graphs (Hardcover, 2015 ed.)
Andrea Marino
R3,059 R2,393 Discovery Miles 23 930 Save R666 (22%) Ships in 10 - 15 working days

In this work we plan to revise the main techniques for enumeration algorithms and to show four examples of enumeration algorithms that can be applied to efficiently deal with some biological problems modelled by using biological networks: enumerating central and peripheral nodes of a network, enumerating stories, enumerating paths or cycles, and enumerating bubbles. Notice that the corresponding computational problems we define are of more general interest and our results hold in the case of arbitrary graphs. Enumerating all the most and less central vertices in a network according to their eccentricity is an example of an enumeration problem whose solutions are polynomial and can be listed in polynomial time, very often in linear or almost linear time in practice. Enumerating stories, i.e. all maximal directed acyclic subgraphs of a graph G whose sources and targets belong to a predefined subset of the vertices, is on the other hand an example of an enumeration problem with an exponential number of solutions, that can be solved by using a non trivial brute-force approach. Given a metabolic network, each individual story should explain how some interesting metabolites are derived from some others through a chain of reactions, by keeping all alternative pathways between sources and targets. Enumerating cycles or paths in an undirected graph, such as a protein-protein interaction undirected network, is an example of an enumeration problem in which all the solutions can be listed through an optimal algorithm, i.e. the time required to list all the solutions is dominated by the time to read the graph plus the time required to print all of them. By extending this result to directed graphs, it would be possible to deal more efficiently with feedback loops and signed paths analysis in signed or interaction directed graphs, such as gene regulatory networks. Finally, enumerating mouths or bubbles with a source s in a directed graph, that is enumerating all the two vertex-disjoint directed paths between the source s and all the possible targets, is an example of an enumeration problem in which all the solutions can be listed through a linear delay algorithm, meaning that the delay between any two consecutive solutions is linear, by turning the problem into a constrained cycle enumeration problem. Such patterns, in a de Bruijn graph representation of the reads obtained by sequencing, are related to polymorphisms in DNA- or RNA-seq data.

On Sets and Graphs - Perspectives on Logic and Combinatorics (Hardcover, 1st ed. 2017): Eugenio G. Omodeo, Alberto Policriti,... On Sets and Graphs - Perspectives on Logic and Combinatorics (Hardcover, 1st ed. 2017)
Eugenio G. Omodeo, Alberto Policriti, Alexandru I. Tomescu
R1,978 Discovery Miles 19 780 Ships in 10 - 15 working days

This treatise presents an integrated perspective on the interplay of set theory and graph theory, providing an extensive selection of examples that highlight how methods from one theory can be used to better solve problems originated in the other. Features: explores the interrelationships between sets and graphs and their applications to finite combinatorics; introduces the fundamental graph-theoretical notions from the standpoint of both set theory and dyadic logic, and presents a discussion on set universes; explains how sets can conveniently model graphs, discussing set graphs and set-theoretic representations of claw-free graphs; investigates when it is convenient to represent sets by graphs, covering counting and encoding problems, the random generation of sets, and the analysis of infinite sets; presents excerpts of formal proofs concerning graphs, whose correctness was verified by means of an automated proof-assistant; contains numerous exercises, examples, definitions, problems and insight panels.

Geometry, Algebra and Applications: From Mechanics to Cryptography (Hardcover, 1st ed. 2016): Marco Castrillon Lopez, Luis... Geometry, Algebra and Applications: From Mechanics to Cryptography (Hardcover, 1st ed. 2016)
Marco Castrillon Lopez, Luis Hernandez Encinas, Pedro Martinez Gadea, M* Eugenia Rosado Maria
R3,837 R3,307 Discovery Miles 33 070 Save R530 (14%) Ships in 10 - 15 working days

This volume collects contributions written by different experts in honor of Prof. Jaime Munoz Masque. It covers a wide variety of research topics, from differential geometry to algebra, but particularly focuses on the geometric formulation of variational calculus; geometric mechanics and field theories; symmetries and conservation laws of differential equations, and pseudo-Riemannian geometry of homogeneous spaces. It also discusses algebraic applications to cryptography and number theory. It offers state-of-the-art contributions in the context of current research trends. The final result is a challenging panoramic view of connecting problems that initially appear distant.

Efficient Predictive Algorithms for Image Compression (Hardcover, 1st ed. 2017): Luis Filipe Rosario Lucas, Eduardo Antonio... Efficient Predictive Algorithms for Image Compression (Hardcover, 1st ed. 2017)
Luis Filipe Rosario Lucas, Eduardo Antonio Barros da Silva, Sergio Manuel Maciel de Faria, Nuno Miguel Morais Rodrigues, Carla Liberal Pagliari
R3,285 Discovery Miles 32 850 Ships in 10 - 15 working days

This book discusses efficient prediction techniques for the current state-of-the-art High Efficiency Video Coding (HEVC) standard, focusing on the compression of a wide range of video signals, such as 3D video, Light Fields and natural images. The authors begin with a review of the state-of-the-art predictive coding methods and compression technologies for both 2D and 3D multimedia contents, which provides a good starting point for new researchers in the field of image and video compression. New prediction techniques that go beyond the standardized compression technologies are then presented and discussed. In the context of 3D video, the authors describe a new predictive algorithm for the compression of depth maps, which combines intra-directional prediction, with flexible block partitioning and linear residue fitting. New approaches are described for the compression of Light Field and still images, which enforce sparsity constraints on linear models. The Locally Linear Embedding-based prediction method is investigated for compression of Light Field images based on the HEVC technology. A new linear prediction method using sparse constraints is also described, enabling improved coding performance of the HEVC standard, particularly for images with complex textures based on repeated structures. Finally, the authors present a new, generalized intra-prediction framework for the HEVC standard, which unifies the directional prediction methods used in the current video compression standards, with linear prediction methods using sparse constraints. Experimental results for the compression of natural images are provided, demonstrating the advantage of the unified prediction framework over the traditional directional prediction modes used in HEVC standard.

Hybrid Metaheuristics - Powerful Tools for Optimization (Hardcover, 1st ed. 2016): Christian Blum, Gunther R. Raidl Hybrid Metaheuristics - Powerful Tools for Optimization (Hardcover, 1st ed. 2016)
Christian Blum, Gunther R. Raidl
R3,913 Discovery Miles 39 130 Ships in 10 - 15 working days

This book explains the most prominent and some promising new, general techniques that combine metaheuristics with other optimization methods. A first introductory chapter reviews the basic principles of local search, prominent metaheuristics, and tree search, dynamic programming, mixed integer linear programming, and constraint programming for combinatorial optimization purposes. The chapters that follow present five generally applicable hybridization strategies, with exemplary case studies on selected problems: incomplete solution representations and decoders; problem instance reduction; large neighborhood search; parallel non-independent construction of solutions within metaheuristics; and hybridization based on complete solution archives. The authors are among the leading researchers in the hybridization of metaheuristics with other techniques for optimization, and their work reflects the broad shift to problem-oriented rather than algorithm-oriented approaches, enabling faster and more effective implementation in real-life applications. This hybridization is not restricted to different variants of metaheuristics but includes, for example, the combination of mathematical programming, dynamic programming, or constraint programming with metaheuristics, reflecting cross-fertilization in fields such as optimization, algorithmics, mathematical modeling, operations research, statistics, and simulation. The book is a valuable introduction and reference for researchers and graduate students in these domains.

Transaction Processing - Management of the Logical Database and its Underlying Physical Structure (Hardcover, 2014 ed.): Seppo... Transaction Processing - Management of the Logical Database and its Underlying Physical Structure (Hardcover, 2014 ed.)
Seppo Sippu, Eljas Soisalon-Soininen
R2,550 Discovery Miles 25 500 Ships in 10 - 15 working days

Transactions are a concept related to the logical database as seen from the perspective of database application programmers: a transaction is a sequence of database actions that is to be executed as an atomic unit of work. The processing of transactions on databases is a well- established area with many of its foundations having already been laid in the late 1970s and early 1980s. The unique feature of this textbook is that it bridges the gap between the theory of transactions on the logical database and the implementation of the related actions on the underlying physical database. The authors relate the logical database, which is composed of a dynamically changing set of data items with unique keys, and the underlying physical database with a set of fixed-size data and index pages on disk. Their treatment of transaction processing builds on the "do-redo-undo" recovery paradigm, and all methods and algorithms presented are carefully designed to be compatible with this paradigm as well as with write-ahead logging, steal-and-no-force buffering, and fine-grained concurrency control. Chapters 1 to 6 address the basics needed to fully appreciate transaction processing on a centralized database system within the context of our transaction model, covering topics like ACID properties, database integrity, buffering, rollbacks, isolation, and the interplay of logical locks and physical latches. Chapters 7 and 8 present advanced features including deadlock-free algorithms for reading, inserting and deleting tuples, while the remaining chapters cover additional advanced topics extending on the preceding foundational chapters, including multi-granular locking, bulk actions, versioning, distributed updates, and write-intensive transactions. This book is primarily intended as a text for advanced undergraduate or graduate courses on database management in general or transaction processing in particular.

Why Cryptography Should Not Rely on Physical Attack Complexity (Hardcover, 1st ed. 2015): Juliane Kramer Why Cryptography Should Not Rely on Physical Attack Complexity (Hardcover, 1st ed. 2015)
Juliane Kramer
R3,193 Discovery Miles 31 930 Ships in 18 - 22 working days

This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successfully implemented in practice, they have generally not been considered a serious threat. In short, their physical attack complexity has been overestimated and the implied security threat has been underestimated. First, the book introduces the photonic side channel, which offers not only temporal resolution, but also the highest possible spatial resolution. Due to the high cost of its initial implementation, it has not been taken seriously. The work shows both simple and differential photonic side channel analyses. Then, it presents a fault attack against pairing-based cryptography. Due to the need for at least two independent precise faults in a single pairing computation, it has not been taken seriously either. Based on these two attacks, the book demonstrates that the assessment of physical attack complexity is error-prone, and as such cryptography should not rely on it. Cryptographic technologies have to be protected against all physical attacks, whether they have already been successfully implemented or not. The development of countermeasures does not require the successful execution of an attack but can already be carried out as soon as the principle of a side channel or a fault attack is sufficiently understood.

High Efficiency Video Coding (HEVC) - Algorithms and Architectures (Hardcover, 2014 ed.): Vivienne Sze, Madhukar Budagavi, Gary... High Efficiency Video Coding (HEVC) - Algorithms and Architectures (Hardcover, 2014 ed.)
Vivienne Sze, Madhukar Budagavi, Gary J. Sullivan
R4,331 Discovery Miles 43 310 Ships in 10 - 15 working days

This book provides developers, engineers, researchers and students with detailed knowledge about the High Efficiency Video Coding (HEVC) standard. HEVC is the successor to the widely successful H.264/AVC video compression standard, and it provides around twice as much compression as H.264/AVC for the same level of quality. The applications for HEVC will not only cover the space of the well-known current uses and capabilities of digital video they will also include the deployment of new services and the delivery of enhanced video quality, such as ultra-high-definition television (UHDTV) and video with higher dynamic range, wider range of representable color, and greater representation precision than what is typically found today. HEVC is the next major generation of video coding design a flexible, reliable and robust solution that will support the next decade of video applications and ease the burden of video on world-wide network traffic. This book provides a detailed explanation of the various parts of the standard, insight into how it was developed, and in-depth discussion of algorithms and architectures for its implementation."

Evolution of Cyber Technologies and Operations to 2035 (Hardcover, 1st ed. 2015): Misty Blowers Evolution of Cyber Technologies and Operations to 2035 (Hardcover, 1st ed. 2015)
Misty Blowers
R2,738 R2,212 Discovery Miles 22 120 Save R526 (19%) Ships in 10 - 15 working days

This book explores the future of cyber technologies and cyber operations which will influence advances in social media, cyber security, cyber physical systems, ethics, law, media, economics, infrastructure, military operations and other elements of societal interaction in the upcoming decades. It provides a review of future disruptive technologies and innovations in cyber security. It also serves as a resource for wargame planning and provides a strategic vision of the future direction of cyber operations. It informs military strategist about the future of cyber warfare. Written by leading experts in the field, chapters explore how future technical innovations vastly increase the interconnectivity of our physical and social systems and the growing need for resiliency in this vast and dynamic cyber infrastructure. The future of social media, autonomy, stateless finance, quantum information systems, the internet of things, the dark web, space satellite operations, and global network connectivity is explored along with the transformation of the legal and ethical considerations which surround them. The international challenges of cyber alliances, capabilities, and interoperability is challenged with the growing need for new laws, international oversight, and regulation which informs cybersecurity studies. The authors have a multi-disciplinary scope arranged in a big-picture framework, allowing both deep exploration of important topics and high level understanding of the topic. Evolution of Cyber Technologies and Operations to 2035 is as an excellent reference for professionals and researchers working in the security field, or as government and military workers, economics, law and more. Students will also find this book useful as a reference guide or secondary text book.

Data Privacy Games (Hardcover, 1st ed. 2018): Lei Xu, Chunxiao Jiang, Yi Qian, Yong Ren Data Privacy Games (Hardcover, 1st ed. 2018)
Lei Xu, Chunxiao Jiang, Yi Qian, Yong Ren
R3,285 Discovery Miles 32 850 Ships in 10 - 15 working days

With the growing popularity of "big data", the potential value of personal data has attracted more and more attention. Applications built on personal data can create tremendous social and economic benefits. Meanwhile, they bring serious threats to individual privacy. The extensive collection, analysis and transaction of personal data make it difficult for an individual to keep the privacy safe. People now show more concerns about privacy than ever before. How to make a balance between the exploitation of personal information and the protection of individual privacy has become an urgent issue. In this book, the authors use methodologies from economics, especially game theory, to investigate solutions to the balance issue. They investigate the strategies of stakeholders involved in the use of personal data, and try to find the equilibrium. The book proposes a user-role based methodology to investigate the privacy issues in data mining, identifying four different types of users, i.e. four user roles, involved in data mining applications. For each user role, the authors discuss its privacy concerns and the strategies that it can adopt to solve the privacy problems. The book also proposes a simple game model to analyze the interactions among data provider, data collector and data miner. By solving the equilibria of the proposed game, readers can get useful guidance on how to deal with the trade-off between privacy and data utility. Moreover, to elaborate the analysis on data collector's strategies, the authors propose a contract model and a multi-armed bandit model respectively. The authors discuss how the owners of data (e.g. an individual or a data miner) deal with the trade-off between privacy and utility in data mining. Specifically, they study users' strategies in collaborative filtering based recommendation system and distributed classification system. They built game models to formulate the interactions among data owners, and propose learning algorithms to find the equilibria.

Applications of Sliding Mode Control (Hardcover, 1st ed. 2017): Nabil Derbel, Jawhar Ghommam, Quanmin Zhu Applications of Sliding Mode Control (Hardcover, 1st ed. 2017)
Nabil Derbel, Jawhar Ghommam, Quanmin Zhu
R4,769 Discovery Miles 47 690 Ships in 10 - 15 working days

This book presents essential studies and applications in the context of sliding mode control, highlighting the latest findings from interdisciplinary theoretical studies, ranging from computational algorithm development to representative applications. Readers will learn how to easily tailor the techniques to accommodate their ad hoc applications. To make the content as accessible as possible, the book employs a clear route in each paper, moving from background to motivation, to quantitative development (equations), and lastly to case studies/illustrations/tutorials (simulations, experiences, curves, tables, etc.). Though primarily intended for graduate students, professors and researchers from related fields, the book will also benefit engineers and scientists from industry.

Dynamic Fuzzy Machine Learning (Hardcover): Fanzhang Li, Li Zhang, Zhao Zhang Dynamic Fuzzy Machine Learning (Hardcover)
Fanzhang Li, Li Zhang, Zhao Zhang
R4,702 Discovery Miles 47 020 Ships in 10 - 15 working days

Machine learning is widely used for data analysis. Dynamic fuzzy data are one of the most difficult types of data to analyse in the field of big data, cloud computing, the Internet of Things, and quantum information. At present, the processing of this kind of data is not very mature. The authors carried out more than 20 years of research, and show in this book their most important results. The seven chapters of the book are devoted to key topics such as dynamic fuzzy machine learning models, dynamic fuzzy self-learning subspace algorithms, fuzzy decision tree learning, dynamic concepts based on dynamic fuzzy sets, semi-supervised multi-task learning based on dynamic fuzzy data, dynamic fuzzy hierarchy learning, examination of multi-agent learning model based on dynamic fuzzy logic. This book can be used as a reference book for senior college students and graduate students as well as college teachers and scientific and technical personnel involved in computer science, artificial intelligence, machine learning, automation, data analysis, mathematics, management, cognitive science, and finance. It can be also used as the basis for teaching the principles of dynamic fuzzy learning.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Information Exchange in 21st Century…
Robert A Wallace Hardcover R3,040 R2,752 Discovery Miles 27 520
Math(s) Fix, The: An Education Blueprint…
Conrad Wolfram Hardcover R525 Discovery Miles 5 250
Cryptocurrency - 3 In 1 - Blockchain…
Mark Smith Hardcover R748 R662 Discovery Miles 6 620
System and Technology Advancements in…
Vivek Kumar, Fuhua Lin Hardcover R4,479 Discovery Miles 44 790
Accelerated Broadcast Club Curriculum…
Paul William Richards Paperback R206 Discovery Miles 2 060
Research Anthology on Applying Social…
Information R Management Association Hardcover R8,997 Discovery Miles 89 970
Online Course Management - Concepts…
Information Reso Management Association Hardcover R7,372 Discovery Miles 73 720
Play/Write - Digital Rhetoric, Writing…
Douglas Eyman, Andrea D Davis Hardcover R1,505 Discovery Miles 15 050
Handbook of Research on Acquiring 21st…
Carol-Ann Lane Hardcover R7,951 Discovery Miles 79 510
Networked Collaborative Learning…
Guglielmo Trentin Paperback R1,458 Discovery Miles 14 580

 

Partners