![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Applications of computing
This book treats essentials from neurophysiology (Hodgkin-Huxley equations, synaptic transmission, prototype networks of neurons) and related mathematical concepts (dimensionality reductions, equilibria, bifurcations, limit cycles and phase plane analysis). This is subsequently applied in a clinical context, focusing on EEG generation, ischaemia, epilepsy and neurostimulation. The book is based on a graduate course taught by clinicians and mathematicians at the Institute of Technical Medicine at the University of Twente. Throughout the text, the author presents examples of neurological disorders in relation to applied mathematics to assist in disclosing various fundamental properties of the clinical reality at hand. Exercises are provided at the end of each chapter; answers are included. Basic knowledge of calculus, linear algebra, differential equations and familiarity with MATLAB or Python is assumed. Also, students should have some understanding of essentials of (clinical) neurophysiology, although most concepts are summarized in the first chapters. The audience includes advanced undergraduate or graduate students in Biomedical Engineering, Technical Medicine and Biology. Applied mathematicians may find pleasure in learning about the neurophysiology and clinic essentials applications. In addition, clinicians with an interest in dynamics of neural networks may find this book useful, too.
The book is devoted to the analysis of big data in order to extract from these data hidden patterns necessary for making decisions about the rational behavior of complex systems with the different nature that generate this data. To solve these problems, a group of new methods and tools is used, based on the self-organization of computational processes, the use of crisp and fuzzy cluster analysis methods, hybrid neural-fuzzy networks, and others. The book solves various practical problems. In particular, for the tasks of 3D image recognition and automatic speech recognition large-scale neural networks with applications for Deep Learning systems were used. Application of hybrid neuro-fuzzy networks for analyzing stock markets was presented. The analysis of big historical, economic and physical data revealed the hidden Fibonacci pattern about the course of systemic world conflicts and their connection with the Kondratieff big economic cycles and the Schwabe-Wolf solar activity cycles. The book is useful for system analysts and practitioners working with complex systems in various spheres of human activity.
This textbook is designed for graduate-level courses, and for self-study, in analog and sampled-data, including switched-capacitor, circuit theory and design for ongoing, or active electrical engineers, needing to become proficient in analog circuit design on a system, rather than on a device, level. After decades of experience in industry and teaching this material in academic settings, the author has extracted many of the most important and useful features of analog circuit theory and design and presented them in a manner that is easy to digest and utilize. The methodology and analysis techniques presented can be applied to areas well beyond those specifically addressed in this book. This book is meant to enable readers to gain a 'general knowledge' of one aspect of analog engineering (e.g., that of network theory, filter design, system theory and sampled-data signal processing). The presentation is self-contained and should be accessible to anyone with a first degree in electrical engineering.
This book has a focus on the development and deployment of the Industrial Internet of Things (IIoT) paradigm, discussing frameworks, methodologies, benefits and limitations, as well as providing case studies of employing the IoT vision in the industrial domain. IIoT is becoming an attractive business reality for many organisations such as manufacturing, logistics, oil and gas, energy and other utilities, mining, aviation, and many more. The opportunities for this paradigm are huge, and according to one report, the IIoT market is predicted to reach $125 billion by 2021. The driving philosophy behind the IIoT is that smart machines are better than humans at accurately capturing, analysing and communicating real-time data. The underlying technologies include distributed computing, machine learning, artificial intelligence, and machine-to-machine communication, with a typical IIoT system consisting of intelligent systems (applications, controllers, sensors, and security mechanisms), data communication infrastructure (cloud computing, edge computing, etc.), data analytics (to support business intelligence and corporate decision making), and most importantly the human element. The promised benefits of the IIoT include enhanced safety, better reliability, smart metering, inventory management, equipment tracking, and facilities management. There are, however, numerous issues that are also becoming the focus of active research, such as concerns regarding service availability, data security, and device communication. Lack of ubiquitous interoperability between heterogeneous devices is also a major concern. This book intends to fill a gap in the IIoT literature by providing the scientific contributions and latest developments from researchers and practitioners of international repute, focusing on frameworks, methodologies, benefits, and inherent issues/barriers to connected environments, especially in industrial settings. The intended audience includes network specialists, hardware engineers, and security experts who wish to adopt newer approaches for device connectivity, IoT security, and sensor-based devices design. University level students, researchers and practitioners will also find the latest innovation in technology and newer approaches relevant to the IIoT from a distributed computing perspective.
The digital age is ripe with emerging advances and applications in technological innovations. Mimicking the structure of complex systems in nature can provide new ideas on how to organize mechanical and personal systems. The Handbook of Research on Modeling, Analysis, and Application of Nature-Inspired Metaheuristic Algorithms is an essential scholarly resource on current algorithms that have been inspired by the natural world. Featuring coverage on diverse topics such as cellular automata, simulated annealing, genetic programming, and differential evolution, this reference publication is ideal for scientists, biological engineers, academics, students, and researchers that are interested in discovering what models from nature influence the current technology-centric world.
Facial recognition software has improved by leaps and bounds over the past few decades, with error rates decreasing significantly within the past ten years. Though this is true, conditions such as poor lighting, obstructions, and profile-only angles have continued to persist in preventing wholly accurate readings. Face Recognition in Adverse Conditions examines how the field of facial recognition takes these adverse conditions into account when designing more effective applications by discussing facial recognition under real world PIE variations, current applications, and the future of the field of facial recognition research. The work is intended for academics, engineers, and researchers specializing in the field of facial recognition.
Advances in Enterprise Information Technology Security provides a broad working knowledge of all the major security issues affecting today's enterprise IT activities. The chapters in this Premier Reference Source are written by some of the world's leading researchers and practitioners in the filed of IT security. There are no simple and complete answers to the issues of security; therefore, multiple techniques, strategies, and applications are thoroughly examined. This reference work presents the tools to address opportunities in the field, and is an all-in-one reference for IT managers, network administrators, researchers, and students.
Secured Transactions: Problems and Materials combines original material with recent cases to teach students about secured financing under Article 9 of the Uniform Commercial Code. Students learn how to identify basic Article 9 issues and craft solutions for them. The book begins with an explanation of secured versus unsecured financing and addresses how transactions were handled before the institution of Article 9. It then discusses specific aspects of Article 9 including its scope, creating and protecting a security interest, priorities, exceptions, fixtures, proceeds, and enforcement. The book is built around a series of problems that connect the cases and original material to the text of Article 9. The original material clarifies and contextualizes the legal issues, providing background and support. The cases demonstrate how legal principles are applied in the real world, enabling students to understand automatic perfection, certificates of title, statutory liens, commercial reasonableness, and more. The revised first edition features updated information regarding laws and legislation, as well as new cases for the chapters on repossessing fixtures and proceeds. Secured Transactions successfully balances the study of law and its application. It is an ideal book for foundational courses in secured transactions.
Tanja Schultz and Katrin Kirchhoff have compiled a comprehensive
overview of speech processing from a multilingual perspective. By
taking this all-inclusive approach to speech processing, the
editors have included theories, algorithms, and techniques that are
required to support spoken input and output in a large variety of
languages. This book presents a comprehensive introduction to
research problems and solutions, both from a theoretical as well as
a practical perspective, and highlights technology that
incorporates the increasing necessity for multilingual applications
in our global community.
Multi-Agent Systems for Education and Interactive Entertainment: Design, Use and Experience presents readers with a rich collection of ideas from researchers who are exploring the complex tradeoffs that must be made in designing agent systems for education and interactive entertainment. This book aims to provide a mixture of relevant theoretical and practical understanding of the use of multi-agent systems in educational and entertainment research, together with practical examples of the use of such systems in real application scenarios.
This edited volume explores the intersection between philosophy and computing. It features work presented at the 2016 annual meeting of the International Association for Computing and Philosophy. The 23 contributions to this volume neatly represent a cross section of 40 papers, four keynote addresses, and eight symposia as they cut across six distinct research agendas. The volume begins with foundational studies in computation and information, epistemology and philosophy of science, and logic. The contributions next examine research into computational aspects of cognition and philosophy of mind. This leads to a look at moral dimensions of man-machine interaction as well as issues of trust, privacy, and justice. This multi-disciplinary or, better yet, a-disciplinary investigation reveals the fruitfulness of erasing distinctions among and boundaries between established academic disciplines. This should come as no surprise. The computational turn itself is a-disciplinary and no former discipline, whether scientific, artistic, or humanistic, has remained unchanged. Rigorous reflection on the nature of these changes opens the door to inquiry into the nature of the world, what constitutes our knowledge of it, and our understanding of our place in it. These investigations are only just beginning. The contributions to this volume make this clear: many encourage further research and end with open questions.
With the rapid development of digital and networking technologies, trust has become an important factor that influences the success of digital life in control and management. Trust Modeling and Management in Digital Environments: From Social Concept to System Development examines how reliance is transferred from a social to a digital concept, enabling digital system users to build up confidence in their system. A defining body of sought after research, this innovative publication provides an understanding of the current challenges, solutions, and their limitations to those interested in this advancing field.
A key technology enabling fast-paced embedded media processing developments is the high-performance, low-power, small-footprint convergent processor, a specialized device that combines the real-time control of a traditional microcontroller with the signal processing power of a DSP. This practical guide is your one-stop shop for understanding how to implement this cutting-edge technology. You will learn how to: * Choose the proper processor for an application. * Architect your system to avoid problems at the outset. * Manage your data flows and memory accesses so that they line up properly * Make smart-trade-offs in portable applications between power considerations and computational performance. * Divide processing tasks across multiple cores. * Program frameworks that optimize performance without needlessly increasing programming model complexity. * Implement benchmarking techniques that will help you adapt a framework to best fit a target application, and much more Covering the entire spectrum of EMP-related design issues, from easy-to-understand explanations of basic architecture and direct memory access (DMA), to in-depth discussions of code optimization and power management, this practical book will be an invaluable aid to every engineer working with EMP, from the beginner to the seasoned expert. All disc-based content for this title is now available on the
Web. * Comprehensive subject coverage with emphasis on practical application * Essential assembly language code included throughout text * Many real-world examples using Analog's popular Blackfin Processor architecture
In today's modernized market, various disciplines continue to search for universally functional technologies that improve upon traditional processes. Artificial neural networks are a set of statistical modeling tools that are capable of processing nonlinear data with strong accuracy. Due to their complexity, utilizing their potential was previously seen as a challenge. However, with the development of artificial intelligence, this technology has proven to be an effective and efficient problem-solving method. Artificial Neural Network Applications in Business and Engineering is an essential reference source that illustrates recent advancements of artificial neural networks in various professional fields, accompanied by specific case studies and practical examples. Featuring research on topics such as training algorithms, transportation, and computer security, this book is ideally designed for researchers, students, developers, managers, engineers, academicians, industrialists, policymakers, and educators seeking coverage on modern trends in artificial neural networks and their real-world implementations.
Trying to learn Maya programming from the documentation can be
daunting whether or not you are a programmer. The first edition of
"MEL Scripting for Maya Animators" earned the reputation as the
best introductory book on MEL, Maya's scripting language. Now fully
revised and updated, the second edition also includes new features,
such as a discussion of global procedures, new chapters on fixing
programming bottlenecks, advanced user interface techniques, and
optimizing character rigs. New chapters on utility nodes and Maya's
Web Panel feature provide new ideas on how to use MEL in
applications.
A practical reference written to assist the security professional
in clearly identifying what systems are required to meet security
needs as defined by a threat analysis and vulnerability assessment.
All of the elements necessary to conduct a detailed survey of a
facility and the methods used to document the findings of that
survey are covered. Once the required systems are determined, the
chapters following present how to assemble and evaluate bids for
the acquisition of the required systems in a manner that will meet
the most rigorous standards established for competitive bidding.
The book also provides recommended approaches for system/user
implementation, giving checklists and examples for developing
management controls using the installed systems. This book was
developed after a careful examination of the approved reference
material available from the American Society for Industrial
Security (ASIS International) for the certification of Physical
Security Professionals (PSP). It is intended to fill voids left by
the currently approved reference material to perform implementation
of systems suggested in the existing reference texts. This book is
an excellent "How To" for the aspiring security professional who
wishes to take on the responsibilities of security system
implementation, or the security manager who wants to do a
professional job of system acquisition without hiring a
professional consultant.
Corporations accumulate a lot of valuable data and knowledge over time, but storing and maintaining this data can be a logistic and financial headache for business leaders and IT specialists. Uncovering Essential Software Artifacts through Business Process Archaeology introduces an emerging method of software modernisation used to effectively manage legacy systems and company operations supported by such systems. This book presents methods, techniques, and new trends on business process archaeology as well as some industrial success stories. Business experts, professionals, and researchers working in the field of information and knowledge management will use this reference source to efficiently and effectively implement and utilise business knowledge.
The unique research area of audio-visual speech recognition has attracted much interest in recent years as visual information about lip dynamics has been shown to improve the performance of automatic speech recognition systems, especially in noisy environments.""Visual Speech Recognition: Lip Segmentation and Mapping"" presents an up-to-date account of research done in the areas of lip segmentation, visual speech recognition, and speaker identification and verification. A useful reference for researchers working in this field, this book contains the latest research results from renowned experts with in-depth discussion on topics such as visual speaker authentication, lip modeling, and systematic evaluation of lip features.
This book introduces the applications of deep learning in various human centric visual analysis tasks, including classical ones like face detection and alignment and some newly rising tasks like fashion clothing parsing. Starting from an overview of current research in human centric visual analysis, the book then presents a tutorial of basic concepts and techniques of deep learning. In addition, the book systematically investigates the main human centric analysis tasks of different levels, ranging from detection and segmentation to parsing and higher-level understanding. At last, it presents the state-of-the-art solutions based on deep learning for every task, as well as providing sufficient references and extensive discussions. Specifically, this book addresses four important research topics, including 1) localizing persons in images, such as face and pedestrian detection; 2) parsing persons in details, such as human pose and clothing parsing, 3) identifying and verifying persons, such as face and human identification, and 4) high-level human centric tasks, such as person attributes and human activity understanding. This book can serve as reading material and reference text for academic professors / students or industrial engineers working in the field of vision surveillance, biometrics, and human-computer interaction, where human centric visual analysis are indispensable in analysing human identity, pose, attributes, and behaviours for further understanding.
As the healthcare industry continues to expand, it must utilize technology to ensure efficiencies are maintained. Healthcare needs to move in a direction where computational methods and algorithms can relieve the routine work of medical doctors, leaving them more time to carry out more important and skilled tasks such as surgery. Computational Methods and Algorithms for Medicine and Optimized Clinical Practice discusses some of the most interesting aspects of theoretical and applied research covering complementary facets of computational methods and algorithms to achieve greater efficiency and support medical personnel. Featuring research on topics such as healthcare reform, artificial intelligence, and disease detection, this book will particularly appeal to medical professionals and practitioners, hospitals, administrators, students, researchers, and academicians.
This book bridges the communication gap between neuroscientists and engineers through the unifying theme of correlation-based learning Developing brain-style signal processing or machine learning algorithms has attracted many sharp minds from a range of disciplines. Now, coauthored by four researchers with varying backgrounds in signal processing, neuroscience, psychology, and computer science, Correlative Learning unifies the many cross-fertilized ideas in computational neuroscience and signal processing in a common language that will help engineers understand and appreciate the human brain as a highly sophisticated biosystem for building more intelligent machines. First, the authors present the necessary neuroscience background for engineers, and then go on to relate the common intrinsic structures of the learning mechanisms of the brain to signal processing, machine learning, kernel learning, complex-valued domains, and the ALOPEX learning paradigm. This correlation-based approach to building complex, reliable (robust), and adaptive systems is vital for engineers, researchers, and graduate students from various fields of science and engineering. Figures, tables, worked examples, and case studies illustrate how to use computational tools for either helping to understand brain functions or fitting specific engineering applications, and a comprehensive bibliography covering over 1,000 references from major publications is included for further reading.
This book explores the main elements of e-Democracy, the term normally used to describe the implementation of democratic government processes by electronic means. It provides insights into the main technological and human issues regarding governance, government, participation, inclusion, empowerment, procurement and, last but not least, ethical and privacy issues. Its main aim is to bridge the gap between technological solutions, their successful implementation, and the fruitful utilization of the main set of e-Services totally or partially delivered by governments or non-government organizations. Today, various parameters actively influence e-Services' success or failure: cultural aspects, organisational issues, bureaucracy and workflows, infrastructure and technology in general, user habits, literacy, capacity or merely interaction design. This includes having a significant population of citizens who are willing and able to adopt and use online services; as well as developing the managerial and technical capability to implement applications that meet citizens' needs. This book helps readers understand the mutual dependencies involved; further, a selection of success stories and failures, duly commented on, enables readers to identify the right approach to innovation in governmental e-Services. With its balanced humanistic and technological approach, the book mainly targets public authorities, decision-makers, stakeholders, solution developers, and graduate students. |
You may like...
Discovering Computers 2018 - Digital…
Misty Vermaat, Steven Freund, …
Paperback
Discovering Computers - Digital…
Misty Vermaat, Mark Ciampa, …
Paperback
Artificial Intelligence for Neurological…
Ajith Abraham, Sujata Dash, …
Paperback
R3,925
Discovery Miles 39 250
Dynamic Web Application Development…
David Parsons, Simon Stobart
Paperback
Discovering Computers, Essentials…
Susan Sebok, Jennifer Campbell, …
Paperback
|