Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Computer programming > Algorithms & procedures
Data in the genomics field is booming. In just a few years, organizations such as the National Institutes of Health (NIH) will host 50+ petabytes-or over 50 million gigabytes-of genomic data, and they're turning to cloud infrastructure to make that data available to the research community. How do you adapt analysis tools and protocols to access and analyze that volume of data in the cloud? With this practical book, researchers will learn how to work with genomics algorithms using open source tools including the Genome Analysis Toolkit (GATK), Docker, WDL, and Terra. With this practical book, researchers will learn how to work with genomics algorithms using open source tools including the Genome Analysis Toolkit (GATK), Docker, WDL, and Terra. Geraldine Van der Auwera, longtime custodian of the GATK user community, and Brian O'Connor of the UC Santa Cruz Genomics Institute, guide you through the process. You'll learn by working with real data and genomics algorithms from the field. This book covers: Essential genomics and computing technology background Basic cloud computing operations Getting started with GATK, plus three major GATK Best Practices pipelines Automating analysis with scripted workflows using WDL and Cromwell Scaling up workflow execution in the cloud, including parallelization and cost optimization Interactive analysis in the cloud using Jupyter notebooks Secure collaboration and computational reproducibility using Terra
AI is primed to revolutionize the way we build applications, offering exciting new ways to solve problems, uncover insights, innovate new products, and provide better user experiences. Successful AI is based on a set of core algorithms that form a base of knowledge shared by all data scientists. Grokking Artificial Intelligence Algorithms is a fully-illustrated and interactive tutorial guide to the different approaches and algorithms that underpin AI. Written in simple language and with lots of visual references and hands-on examples, readers learn the concepts, terminology, and theory they need to effectively incorporate AI algorithms into their applications. Grokking Artificial Intelligence Algorithms uses simple language, jargon-busting explanations, and hand-drawn diagrams to open up complex algorithms. Don't worry if you aren't a calculus wunderkind; you'll need only the algebra you picked up in math class. * Use cases for different AI algorithms * How to encode problems and solutions using data structures * Intelligent search for game playing * Ant colony algorithms for path finding * Evolutionary algorithms for optimization problems For software developers with high school-level algebra and calculus skills.
Discrete Mathematics has permeated the whole of mathematics so much so it has now come to be taught even at the high school level. This book presents the basics of Discrete Mathematics and its applications to day-to-day problems in several areas. This book is intended for undergraduate students of Computer Science, Mathematics and Engineering. A number of examples have been given to enhance the understanding of concepts. The programming languages used are Pascal and C.
This book is useful to understand and write alongside non-human agents, examine the impact of algorithms and AI on writing, and accommodate relationships with autonomous agents. This ground-breaking future-driven framework prepares scholars and practitioners to investigate and plan for the social, digital literacy, and civic implications arising from emerging technologies. This book prepares researchers, students, practitioners, and citizens to work with AI writers, virtual humans, and social robots. This book explores prompts to envision how fields and professions will change. The book's unique integration with Fabric of Digital Life, a database and structured content repository for conducting social and cultural analysis of emerging technologies, provides concrete examples throughout. Readers gain imperative direction for collaborative, algorithmic, and autonomous writing futures.
Algorithmics of Nonuniformity is a solid presentation about the analysis of algorithms, and the data structures that support them. Traditionally, algorithmics have been approached either via a probabilistic view or an analytic approach. The authors adopt both approaches and bring them together to get the best of both worlds and benefit from the advantage of each approach. The text examines algorithms that are designed to handle general data-sort any array, find the median of any numerical set, and identify patterns in any setting. At the same time, it evaluates "average" performance, "typical" behavior, or in mathematical terms, the expectations of the random variables that describe their operations. Many exercises are presented, which are essential since they convey additional material complementing the content of the chapters. For this reason, the solutions are more than mere answers, but explain and expand upon related concepts, and motivate further work by the reader. Highlights: A unique book that merges probability with analysis of algorithms Approaches analysis of algorithms from the angle of uniformity Non-uniformity makes more realistic models of real-life scenarios possible Results can be applied to many applications Includes many exercises of various levels of difficulty About the Authors: Micha Hofri is a Professor of Computer Science, and former department head at Worcester Polytechnic Institute. He holds a Ph.D. of Industrial Engineering (1972), all from Technion, the Israel Institute of Technology. He has 39 publications in Mathematics. Hosam Mahmoud is a Professor at, the Department of Statistics at George Washington University in Washington D.C., where he used to be the former chair. He holds an Ph.D. in Computer Science from Ohio State University. He is on the editorial board of five academic journals.
This book focuses on the analytic principles of business practice and big data. Specifically, it provides an interface between the main disciplines of engineering/technology and the organizational and administrative aspects of management, serving as a complement to books in other disciplines such as economics, finance, marketing and risk analysis. The contributors present their areas of expertise, together with essential case studies that illustrate the successful application of engineering management theories in real-life examples.
Understand advanced data analytics concepts such as time series and principal component analysis with ETL, supervised learning, and PySpark using Python. This book covers architectural patterns in data analytics, text and image classification, optimization techniques, natural language processing, and computer vision in the cloud environment. Generic design patterns in Python programming is clearly explained, emphasizing architectural practices such as hot potato anti-patterns. You'll review recent advances in databases such as Neo4j, Elasticsearch, and MongoDB. You'll then study feature engineering in images and texts with implementing business logic and see how to build machine learning and deep learning models using transfer learning. Advanced Analytics with Python, 2nd edition features a chapter on clustering with a neural network, regularization techniques, and algorithmic design patterns in data analytics with reinforcement learning. Finally, the recommender system in PySpark explains how to optimize models for a specific application. What You'll Learn Build intelligent systems for enterprise Review time series analysis, classifications, regression, and clustering Explore supervised learning, unsupervised learning, reinforcement learning, and transfer learning Use cloud platforms like GCP and AWS in data analytics Understand Covers design patterns in Python Who This Book Is For Data scientists and software developers interested in the field of data analytics.
Teach Your Students How to Use Computing to Explore Powerful and Creative Ideas In the twenty-first century, computers have become indispensable in music making, distribution, performance, and consumption. Making Music with Computers: Creative Programming in Python introduces important concepts and skills necessary to generate music with computers. It interweaves computing pedagogy with musical concepts and creative activities, showing students how to integrate the creativity and design of the arts with the mathematical rigor and formality of computer science. The book provides an introduction to creative software development in the Python programming language. It uses innovative music-creation activities to illustrate introductory computer programming concepts, including data types, algorithms, operators, iteration, lists, functions, and classes. The authors also cover GUIs, event-driven programming, big data, sonification, MIDI programming, client server programming, recursion, fractals, and complex system dynamics. Requiring minimal musical or programming experience, the text is designed for courses in introductory computer science and computing in the arts. It helps students learn computer programming in a creative context and understand how to build computer music applications. Also suitable for self-study, the book shows musicians and digital music enthusiasts how to write music software and create algorithmic music compositions. Web Resource
Noteworthy results, proof techniques, open problems and conjectures in generalized (edge-) connectivity are discussed in this book. Both theoretical and practical analyses for generalized (edge-) connectivity of graphs are provided. Topics covered in this book include: generalized (edge-) connectivity of graph classes, algorithms, computational complexity, sharp bounds, Nordhaus-Gaddum-type results, maximum generalized local connectivity, extremal problems, random graphs, multigraphs, relations with the Steiner tree packing problem and generalizations of connectivity. This book enables graduate students to understand and master a segment of graph theory and combinatorial optimization. Researchers in graph theory, combinatorics, combinatorial optimization, probability, computer science, discrete algorithms, complexity analysis, network design, and the information transferring models will find this book useful in their studies.
Eigenvalue computations are ubiquitous in science and engineering. John Francis's implicitly shifted QR algorithm has been the method of choice for small to medium sized eigenvalue problems since its invention in 1959. This book presents a new view of this classical algorithm. While Francis's original procedure chases bulges, the new version chases core transformations, which allows the development of fast algorithms for eigenvalue problems with a variety of special structures. This also leads to a fast and backward stable algorithm for computing the roots of a polynomial by solving the companion matrix eigenvalue problem. The authors received a SIAM Outstanding Paper prize for this work. This book will be of interest to researchers in numerical linear algebra and their students.
The foundations of parallel computation, especially the efficiency of computation, are the concern of this book. Distinguished international researchers have contributed fifteen chapters which together form a coherent stream taking the reader who has little prior knowledge of the field to a position of being familiar with leading edge issues. The book may also function as a source of teaching material and reference for researchers. The first part is devoted to the Parallel Random Access Machine (P-RAM) model of parallel computation. The initial chapters justify and define the model, which is then used for the development of algorithm design in a variety of application areas such as deterministic algorithms, randomisation and algorithm resilience. The second part deals with distributed memory models of computation. The question of efficiently implementing P-RAM algorithms within these models is addressed as are the immensely interesting prospects for general purpose parallel computation.
Design And Analyze algorithms for distributed computing environments "Design and Analysis of Distributed Algorithms" focuses on developing problem-solving skills and fully exploiting design tools and techniques. Moreover, the author helps readers develop the analytical tools and skills needed to evaluate the costs of complex designs and protocols. This text is based on a simple and fully reactive computational model that allows for intuitive comprehension and logical designs. The principles and techniques that users learn can be applied to any distributed computing environment (e.g., distributed systems, communication networks, data networks, grid networks, internet, etc.). Based on a method developed and refined during the author's twenty years of teaching experience, the text provides a wealth of unique material and learning aids that enable the reader to learn how to design algorithms and protocols to solve problems and perform tasks efficiently in a distributed computing environment. Features include: Emphasis on developing problem-solving skills and fully leveraging design tools and techniques with a straightforward, easy-to-follow writing style Chapter on distributed data and structures, an important area not covered in comparable texts Detailed coverage of synchronous computations, a necessary element for "energy aware" computing Theoretical and experimental exercises in each chapter that allow readers to apply their newfound skills All algorithms and protocols presented in the text, as well as those in the exercises, are easily and immediately programmable. References at the end of each chapter lead readers to additional materials for further study. A naturaltextbook for upper-level undergraduates and graduate students, with its emphasis on problem solving, this book is also ideal for system-protocol designers and communications software engineers and developers. It will enable them to understand the principles of how to design workable, efficient protocols in any distributed computing environment.
Geomatics is a field of science that has been intimately intertwined with our daily lives for almost 30 years, to the point where we often forget all the challenges it entails. Who does not have a navigation application on their phone or regularly engage with geolocated data? What is more, in the coming decades, the accumulation of geo-referenced data is expected to increase significantly. This book focuses on the notion of the imperfection of geographic data, an important topic in geomatics. It is essential to be able to define and represent the imperfections that are encountered in geographical data. Ignoring these imperfections can lead to many risks, for example in the use of maps which may be rendered inaccurate. It is, therefore, essential to know how to model and treat the different categories of imperfection. A better awareness of these imperfections will improve the analysis and the use of this type of data.
Cryptography is now ubiquitous - moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and even medical implants. Today's designers need a comprehensive understanding of applied cryptography. After an introduction to cryptography and data security, the authors explain the main techniques in modern cryptography, with chapters addressing stream ciphers, the Data Encryption Standard (DES) and 3DES, the Advanced Encryption Standard (AES), block ciphers, the RSA cryptosystem, public-key cryptosystems based on the discrete logarithm problem, elliptic-curve cryptography (ECC), digital signatures, hash functions, Message Authentication Codes (MACs), and methods for key establishment, including certificates and public-key infrastructure (PKI). Throughout the book, the authors focus on communicating the essentials and keeping the mathematics to a minimum, and they move quickly from explaining the foundations to describing practical implementations, including recent topics such as lightweight ciphers for RFIDs and mobile devices, and current key-length recommendations. The authors have considerable experience teaching applied cryptography to engineering and computer science students and to professionals, and they make extensive use of examples, problems, and chapter reviews, while the book's website offers slides, projects and links to further resources. This is a suitable textbook for graduate and advanced undergraduate courses and also for self-study by engineers.
This open access book constitutes the proceedings of the 31st European Symposium on Programming, ESOP 2022, which was held during April 5-7, 2022, in Munich, Germany, as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2022. The 21 regular papers presented in this volume were carefully reviewed and selected from 64 submissions. They deal with fundamental issues in the specification, design, analysis, and implementation of programming languages and systems.
Ever since Lorensen and Cline published their paper on the Marching Cubes algorithm, isosurfaces have been a standard technique for the visualization of 3D volumetric data. Yet there is no book exclusively devoted to isosurfaces. Isosurfaces: Geometry, Topology, and Algorithms represents the first book to focus on basic algorithms for isosurface construction. It also gives a rigorous mathematical perspective on some of the algorithms and results. In color throughout, the book covers the Marching Cubes algorithm and variants, dual contouring algorithms, multilinear interpolation, multiresolution isosurface extraction, isosurfaces in four dimensions, interval volumes, and contour trees. It also describes data structures for faster isosurface extraction as well as methods for selecting significant isovalues. For designers of visualization software, the book presents an organized overview of the various algorithms associated with isosurfaces. For graduate students, it provides a solid introduction to research in this area. For visualization researchers, the book serves as a reference to the vast literature on isosurfaces.
In today's data-driven world, more sophisticated algorithms for data processing are in high demand, mainly when the data cannot be handled with the help of traditional techniques. Self-learning and adaptive algorithms are now widely used by such leading giants that as Google, Tesla, Microsoft, and Facebook in their projects and applications. In this guide designed for researchers and students of computer science, readers will find a resource for how to apply methods that work on real-life problems to their challenging applications, and a go-to work that makes fuzzy clustering issues and aspects clear. Including research relevant to those studying cybernetics, applied mathematics, statistics, engineering, and bioinformatics who are working in the areas of machine learning, artificial intelligence, complex system modeling and analysis, neural networks, and optimization, this is an ideal read for anyone interested in learning more about the fascinating new developments in machine learning.
Written by authors at the forefront of modern algorithms research, Delaunay Mesh Generation demonstrates the power and versatility of Delaunay meshers in tackling complex geometric domains ranging from polyhedra with internal boundaries to piecewise smooth surfaces. Covering both volume and surface meshes, the authors fully explain how and why these meshing algorithms work. The book is one of the first to integrate a vast amount of cutting-edge material on Delaunay triangulations. It begins with introducing the problem of mesh generation and describing algorithms for constructing Delaunay triangulations. The authors then present algorithms for generating high-quality meshes in polygonal and polyhedral domains. They also illustrate how to use restricted Delaunay triangulations to extend the algorithms to surfaces with ridges and patches and volumes with smooth surfaces. For researchers and graduate students, the book offers a rigorous theoretical analysis of mesh generation methods. It provides the necessary mathematical foundations and core theoretical results upon which researchers can build even better algorithms in the future. For engineers, the book shows how the algorithms work well in practice. It explains how to effectively implement them in the design and programming of mesh generation software.
Electrical Engineering Handbook of Real-Time Fast Fourier Transforms Algorithms to Product Testing "This useful, logical, unbiased, FFT compendium allows the user to quickly and accurately obtain practical information to implement a solution or simply acquire a general overview without spending months gathering this information elsewhere." Jay Perry, Executive Vice President, Technology, Catalina Research, Inc. "This is a practical guide for understanding and using FFTs. Win's (Winthrop Smith, author) years of experience using FFTs to solve real-world problems comes through on page after page. If you're building an FFT processor, you'll find this book indispensable." Tony Agnello, President, Ariel Corp. FFTs are at the heart of ADSL, the new telecom standard (T1.413), which allows phones to transfer digital data 200 times faster and simultaneously transmit speech. Fast Fourier Transforms (FFTs) synthesize, recognize, enhance, compress, modify, or analyze signals in products such as Doppler weather radar, CT and MRI scans, AWACS radar, and satellite imaging radar. In this book, you will get the foundation and facts you need to implement FFT algorithms for many diverse applications. Key features you will put to immediate use include:
Build a Keras model to scale and deploy on a Kubernetes cluster We have seen an exponential growth in the use of Artificial Intelligence (AI) over last few years. AI is becoming the new electricity and is touching every industry from retail to manufacturing to healthcare to entertainment. Within AI, we re seeing a particular growth in Machine Learning (ML) and Deep Learning (DL) applications. ML is all about learning relationships from labeled (Supervised) or unlabeled data (Unsupervised). DL has many layers of learning and can extract patterns from unstructured data like images, video, audio, etc. Keras to Kubernetes: The Journey of a Machine Learning Model to Production takes you through real-world examples of building DL models in Keras for recognizing product logos in images and extracting sentiment from text. You will then take that trained model and package it as a web application container before learning how to deploy this model at scale on a Kubernetes cluster. You will understand the different practical steps involved in real-world ML implementations which go beyond the algorithms. - Find hands-on learning examples - Learn to uses Keras and Kubernetes to deploy Machine Learning models - Discover new ways to collect and manage your image and text data with Machine Learning - Reuse examples as-is to deploy your models - Understand the ML model development lifecycle and deployment to production If you re ready to learn about one of the most popular DL frameworks and build production applications with it, you ve come to the right place!
This book constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Game Theory for Networks (GameNets 2011) held in Shanghai, China, April 16-18, 2011. The 45 revised full papers presented were carefully selected from numerous submissions and focus topics such as mechanism design, physical layer games, network mechanisms, stochastic and dynamic games, game-theoretic network models, cooperative games in networks, security games, spectrum sharing games, P2P and social networks and economics of network QoS.
This state-of-the-art survey offers a renewed and refreshing focus on the progress in evolutionary computation, in neural networks, and in fuzzy systems. The book presents the expertise and experiences of leading researchers spanning a diverse spectrum of computational intelligence in these areas. The result is a balanced contribution to the research area of computational intelligence that should serve the community not only as a survey and a reference, but also as an inspiration for the future advancement of the state of the art of the field. The 13 selected chapters originate from lectures and presentations given at the IEEE World Congress on Computational Intelligence, WCCI 2012, held in Brisbane, Australia, in June 2012.
This book constitutes the refereed proceedings of the 6th International Conference, FUN 2012, held in June 2012 in Venice, Italy. The 34 revised full papers were carefully reviewed and selected from 56 submissions. They feature a large variety of topics in the field of the use, design, and analysis of algorithms and data structures, focusing on results that provide amusing, witty but nonetheless original and scientifically profound contributions to the area.
This book constitutes the refereed proceedings of the 16th International Conference on Secure IT Systems, NordSec 2011, held in Tallinn, Estonia, October 26-28, 2011. The 16 revised papers presented together with 2 invited talks were carefully reviewed and selected from 51 submissions. The papers are organized in topical sections on applied cryptography, commercial security policies and their enforcement, communication and network security, security modeling and metrics, economics, law and social aspects of security, and software security and malware. |
You may like...
Soft Computing - Recent Advances and…
Pradip Debnath, Oscar Castillo, …
Hardcover
R2,789
Discovery Miles 27 890
The Garbage Collection Handbook - The…
Richard Jones, Antony Hosking, …
Hardcover
R1,922
Discovery Miles 19 220
The Garbage Collection Handbook - The…
Richard Jones, Antony Hosking, …
Paperback
R1,450
Discovery Miles 14 500
Swarm Intelligence - Foundation…
Abhishek Sharma, Abhinav Sharma, …
Hardcover
R2,579
Discovery Miles 25 790
Algorithm Design: A Methodological…
Patrick Bosc, Marc Guyomard, …
Paperback
R1,617
Discovery Miles 16 170
|