Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Applications of computing
Provides a technical introduction to deepfakes, its benefits, and the potential harms Presents practical approaches of creation and detection of deepfakes using Deep Learning (DL) Techniques Draws attention towards various challenging issues and societal impact of deepfakes with their existing solutions Includes research analysis in the domain of DL fakes for assisting the creation and detection of deepfakes applications Discusses future research directions with emergence of deepfakes technology
This book explores the phenomenon of data - big and small - in the contemporary digital, informatic and legal-bureaucratic context. Challenging the way in which legal interest in data has focused on rights and privacy concerns, this book examines the contestable, multivocal and multifaceted figure of the contemporary data subject. The book analyses "data" and "personal data" as contemporary phenomena, addressing the data realms, such as stores, institutions, systems and networks, out of which they emerge. It interrogates the role of law, regulation and governance in structuring both formal and informal definitions of the data subject, and disciplining data subjects through compliance with normative standards of conduct. Focusing on the 'personal' in and of data, the book pursues a re-evaluation of the nature, role and place of the data subject qua legal subject in on and offline societies: one that does not begin and end with the inviolability of individual rights but returns to more fundamental legal principles suited to considerations of personhood, such as stewardship, trust, property and contract. The book's concern with the production, use, abuse and alienation of personal data within the context of contemporary communicative capitalism will appeal to scholars and students of law, science and technology studies, and sociology; as well as those with broader political interests in this area.
Uses the two programming languages officially supported in ROS2 (C++, mainly, and Python). Approaches ROS2 from three different but complementary dimensions; the Community, Computation Graph, and the Workspace. Includes a complete simulated robot, development and testing strategies, Behavior Trees, and Nav2 description, setup and use. A GitHub repository with code to assist readers.
This volume brings together two prominent strands in second language acquisition theory and research: the concept of learner autonomy and computer-assisted language learning (CALL). Learner autonomy supports learners in becoming more reflective and communicative and in experimenting with language and language learning. CALL environments offer more and qualitatively different opportunities for learner autonomy than the traditional language classroom. This book offers researchers a starting point into researching learner autonomy in CALL contexts and offers teachers practical advice on chances and pitfalls in realizing learner autonomy goals in the CALL-supported classroom.
Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE) introduces a new methodology to help critical infrastructure owners, operators and their security practitioners make demonstrable improvements in securing their most important functions and processes. Current best practice approaches to cyber defense struggle to stop targeted attackers from creating potentially catastrophic results. From a national security perspective, it is not just the damage to the military, the economy, or essential critical infrastructure companies that is a concern. It is the cumulative, downstream effects from potential regional blackouts, military mission kills, transportation stoppages, water delivery or treatment issues, and so on. CCE is a validation that engineering first principles can be applied to the most important cybersecurity challenges and in so doing, protect organizations in ways current approaches do not. The most pressing threat is cyber-enabled sabotage, and CCE begins with the assumption that well-resourced, adaptive adversaries are already in and have been for some time, undetected and perhaps undetectable. Chapter 1 recaps the current and near-future states of digital technologies in critical infrastructure and the implications of our near-total dependence on them. Chapters 2 and 3 describe the origins of the methodology and set the stage for the more in-depth examination that follows. Chapter 4 describes how to prepare for an engagement, and chapters 5-8 address each of the four phases. The CCE phase chapters take the reader on a more granular walkthrough of the methodology with examples from the field, phase objectives, and the steps to take in each phase. Concluding chapter 9 covers training options and looks towards a future where these concepts are scaled more broadly.
Optimization techniques are at the core of data science, including data analysis and machine learning. An understanding of basic optimization techniques and their fundamental properties provides important grounding for students, researchers, and practitioners in these areas. This text covers the fundamentals of optimization algorithms in a compact, self-contained way, focusing on the techniques most relevant to data science. An introductory chapter demonstrates that many standard problems in data science can be formulated as optimization problems. Next, many fundamental methods in optimization are described and analyzed, including: gradient and accelerated gradient methods for unconstrained optimization of smooth (especially convex) functions; the stochastic gradient method, a workhorse algorithm in machine learning; the coordinate descent approach; several key algorithms for constrained optimization problems; algorithms for minimizing nonsmooth functions arising in data science; foundations of the analysis of nonsmooth functions and optimization duality; and the back-propagation approach, relevant to neural networks.
Sound Inventions is a collection of 34 articles taken from Experimental Musical Instruments, the seminal journal published from 1984 through 1999. In addition to the selected articles, the editors have contributed introductory essays, placing the material in cultural and temporal context, providing an overview of the field both before and after the time of original publication. The Experimental Musical Instruments journal contributed extensively to a number of sub-fields, including sound sculpture and sound art, sound design, tuning theory, musical instrument acoustics, timbre and timbral perception, musical instrument construction and materials, pedagogy, and contemporary performance and composition. This book provides a picture of this important early period, presenting a wealth of material that is as valuable and relevant today as it was when first published, making it essential reading for anyone researching, working with or studying sound.
a short and accessible introduction on AI and Art written by leading experts
Optimize every stage of your machine learning pipelines with powerful automation components and cutting-edge tools like AutoKeras and KerasTuner. Automated Machine Learning in Action, filled with hands-onexamples and written in an accessible style, reveals how premade machine learning components can automate time-consuming ML tasks. Automated Machine Learning in Action teaches you to automate selecting the best machine learning models or data preparation methods for your own machine learning tasks, so your pipelines tune themselves without needing constant input. You'll quickly run through machine learning basics thatopen upon AutoML to non-data scientists, before putting AutoML into practicefor image classification, supervised learning, and more. Automated machine learning (AutoML) automates complex andtime-consuming stages in a machine learning pipeline with pre packaged optimal solutions. This frees up data scientists from data processing and manualtuning, and lets domain experts easily apply machine learning models to their projects.
With an abundance of insightful examples, problems, and computer experiments, Introduction to Logic Design provides a balanced, easy-to-read treatment of the fundamental theory of logic functions and applications to the design of digital devices and systems. Requiring no prior knowledge of electrical circuits or electronics, it supplies the essential material to understand the basic operation and design of digital systems. Satisfying the Requirements of an Introductory Course The text presents a clear picture of basic concepts, effective problem-solving techniques, modern technologies, and applications. It focuses on the relationships between and the manipulation of various data structures. By examining the similarities and differences between assorted theoretical approaches for the representation, manipulation, and optimization of Boolean functions, the authors provide a unified overview of the relationships among digital system design, computer organization, micro- and nanoelectronics, and numerical methods. The book also describes classical minimization techniques, along with advanced and emerging problems of logic design. Meeting the Needs of Developing Technology Reflecting the integrated nature of modern engineering, this text shows how theoretical ideas, physical devices, and design methodologies come together to form a successful design approach. It provides the basis to explore even more sophisticated aspects in the field.
AI in combination with other innovative technologies promises to bring unprecedented opportunities to all aspects of life. These technologies, however, hold great dangers, especially for the manipulation of the human mind, which have given rise to serious ethical concerns. Apart from some sectoral regulatory efforts to address these concerns, no regulatory framework for AI has yet been adopted though in 2021 the European Commission of the EU published a draft Act on Artificial Intelligence and UNESCO followed suit with a Recommendation on the Ethics of Artificial Intelligence. The book contextualises the future regulation of AI, specifically addressing the regulatory challenges relating to the planned prohibition of the use of AI systems that deploy subliminal techniques. The convergence of AI with various related technologies, such as brain-computer interfaces, functional magnetic resonance imaging, robotics and big data, already allows for "mind reading" or "dream hacking" through brain spyware, as well as other practices that intrude on cognition and the right to freedom of thought. Future innovations will enhance the possibilities for manipulating thoughts and behaviour, and they threaten to cause serious harm to individuals as well as to society as a whole. The issue of subliminal perception and the ability to deceive and manipulate the mind below the threshold of awareness causes severe difficulties for law and democracy and raises important questions for the future of society. This book shows how cognitive, technological, and legal questions are intrinsically interwoven, and aims to stimulate an urgently needed transdisciplinary and transnational debate between students, academics, practitioners, policymakers and citizens interested not only in the law but also in disciplines including computer science, neuroscience, sociology, political science, marketing and psychology.
While simulation has a vast area of application, this textbook focuses on the use of simulation to analyse business processes. It provides an up-to-date coverage of all stages of the discrete-event simulation (DES) process, covering important areas such as conceptual modelling, modelling input data, verification and validation and simulation output analysis. The book is comprehensive yet uncomplicated, covering the theoretical aspects of the subject and the practical elements of a typical simulation project, demonstrated by cases, examples and exercises. It also shows how simulation relates to new developments in machine learning, big data analytics and conceptual modelling techniques. Guidance is provided on how to build DES models using the Arena, Simio and Simul8 simulation software, and tutorials for using the software are incorporated throughout. Simulation Modelling offers a uniquely practical and end-to-end overview of the subject, which makes it perfect required or recommended reading for advanced undergraduate and postgraduate students studying business simulation and simulation modelling as part of operations research, business analytics, supply chain management and computer science courses.
In today's information society, to make a real and lasting impact on human welfare takes applications of information technology aimed at enhancing access to all. HUSITA7-The 7th International Conference of Human Services Information Technology Applications: Digital Inclusion-Building a Digital Inclusive Society presents diverse viewpoints from around the globe, examining the latest applications of digital technology for social work education and practice. These conference presentations from respected international authorities discuss the application of ICT (information and communication technology) in various facets of human service to achieve the goal of a digital inclusive society where all have access to education and informational resources. HUSITA7-The 7th International Conference of Human Services Information Technology Applications examines the development and use of information technology in professional training, including the strengths and limitations of e-learning in social work curriculums along with the rationale behind a learning object approach. Research includes findings from educators in Canada describing the development and implementation of e-learning in social work programs and the qualitative study of technological content in an MSW curriculum. Various types of Web-based learning approaches are explored with an eye toward providing more effective teaching strategies. Various technological advances and approaches toward individual empowerment are described to facilitate greater societal inclusiveness. The book is well referenced and includes several helpful tables and figures. Topics in HUSITA7-The 7th International Conference of Human Services Information Technology Applications include: the learning object approach of e-learning for social work education challenges implementing e-learning in social work education a research study of the relationship between technology content in social work education and technology use in social work practice international partnerships in Web-based teaching effective integration of emotion into the content of Web-based learning the use of indigenous knowledge in content the use of Web CT for effective address of issues such as quality of teaching and communication bringing about social inclusion through effective digital government how technological advances impact assistive technology research on the Internet self-efficacy in older person's learning of ICT a communication tool for the speech impaired improving social work service effectiveness through knowledge management (KM) the "SenSui" disability information resource in Japan HUSITA7-The 7th International Conference of Human Services Information Technology Applications is enlightening reading for librarians, social educators, social work students, researchers interested in ICT, and human service professionals.
Even though the semantic Web is a relatively new and dynamic area of research, a whole suite of components, standards, and tools have already been developed around it. Using a concrete approach, Introduction to the Semantic Web and Semantic Web Services builds a firm foundation in the concept of the semantic Web, its principal technologies, its real-world applications, and its relevant coding examples. This introductory yet comprehensive book covers every facet of this exciting technology. After an introduction to the semantic Web concept, it discusses its major technical enablers and the relationships among these components. The author then presents several applications of the semantic Web, including Swoogle, FOAF, and a detailed design of a semantic Web search engine. The book concludes with discussions on how to add semantics to traditional Web service descriptions and how to develop a search engine for semantic Web services. Covering the building blocks of an advanced Web technology, this practical resource equips you with the tools to further explore the world of the semantic Web on your own.
This book brings together computer models and simulation approaches that allow the investigation of a wide range of innovation related issues, and hence will be of interest for academics and researchers from a variety of innovation related disciplines.' - Mercedes Bleda, Journal of Artificial Societies and Social SimulationChristopher Watts and Nigel Gilbert explore the generation, diffusion and impact of innovations, which can now be studied using computer simulations. Agent-based simulation models can be used to explain the innovation that emerges from interactions among complex, adaptive, diverse networks of firms, people, technologies, practices and resources. This book provides a critical review of recent advances in agent-based modeling and other forms of the simulation of innovation. Elements explored include: diffusion of innovations, social networks, organizational learning, science models, adopting and adapting, and technological evolution and innovation networks. Many of the models featured in the book can be downloaded from the book's accompanying website. Bringing together simulation models from several innovation-related fields, this book will prove a fascinating read for academics and researchers in a wide range of disciplines, including: innovation studies, evolutionary economics, complexity science, organization studies, social networks, and science and technology studies. Scholars and researchers in the areas of computer science, operational research and management science will also be interested in the uses of simulation models to improve the understanding of organization.
The only official body of knowledge for CCSP--the most popular cloud security credential--fully revised and updated. Certified Cloud Security Professional (CCSP) certification validates the advanced technical skills needed to design, manage, and secure data, applications, and infrastructure in the cloud. This highly sought-after global credential has been updated with revised objectives. The new third edition of The Official (ISC)2 Guide to the CCSP CBK is the authoritative, vendor-neutral common body of knowledge for cloud security professionals. This comprehensive resource provides cloud security professionals with an indispensable working reference to each of the six CCSP domains: Cloud Concepts, Architecture and Design; Cloud Data Security; Cloud Platform and Infrastructure Security; Cloud Application Security; Cloud Security Operations; and Legal, Risk and Compliance. Detailed, in-depth chapters contain the accurate information required to prepare for and achieve CCSP certification. Every essential area of cloud security is covered, including implementation, architecture, operations, controls, and immediate and long-term responses. Developed by (ISC)2, the world leader in professional cybersecurity certification and training, this indispensable guide: Covers the six CCSP domains and over 150 detailed objectives Provides guidance on real-world best practices and techniques Includes illustrated examples, tables, and diagrams The Official (ISC)2 Guide to the CCSP CBK is a vital ongoing resource for IT and information security leaders responsible for applying best practices to cloud security architecture, design, operations and service orchestration.
A field manual on contextualizing cyber threats, vulnerabilities, and risks to connected cars through penetration testing and risk assessment Hacking Connected Cars deconstructs the tactics, techniques, and procedures (TTPs) used to hack into connected cars and autonomous vehicles to help you identify and mitigate vulnerabilities affecting cyber-physical vehicles. Written by a veteran of risk management and penetration testing of IoT devices and connected cars, this book provides a detailed account of how to perform penetration testing, threat modeling, and risk assessments of telematics control units and infotainment systems. This book demonstrates how vulnerabilities in wireless networking, Bluetooth, and GSM can be exploited to affect confidentiality, integrity, and availability of connected cars. Passenger vehicles have experienced a massive increase in connectivity over the past five years, and the trend will only continue to grow with the expansion of The Internet of Things and increasing consumer demand for always-on connectivity. Manufacturers and OEMs need the ability to push updates without requiring service visits, but this leaves the vehicle's systems open to attack. This book examines the issues in depth, providing cutting-edge preventative tactics that security practitioners, researchers, and vendors can use to keep connected cars safe without sacrificing connectivity. Perform penetration testing of infotainment systems and telematics control units through a step-by-step methodical guide Analyze risk levels surrounding vulnerabilities and threats that impact confidentiality, integrity, and availability Conduct penetration testing using the same tactics, techniques, and procedures used by hackers From relatively small features such as automatic parallel parking, to completely autonomous self-driving cars--all connected systems are vulnerable to attack. As connectivity becomes a way of life, the need for security expertise for in-vehicle systems is becoming increasingly urgent. Hacking Connected Cars provides practical, comprehensive guidance for keeping these vehicles secure.
The methodological needs of environmental studies are unique in the breadth of research questions that can be posed, calling for a textbook that covers a broad swath of approaches to conducting research with potentially many different kinds of evidence. Fully updated to address new developments such as the effects of the internet, recent trends in the use of computers, remote sensing, and large data sets, this new edition of Research Methods for Environmental Studies is written specifically for social science-based research into the environment. This revised edition contains new chapters on coding, focus groups, and an extended treatment of hypothesis testing. The textbook covers the best-practice research methods most used to study the environment and its connections to societal and economic activities and objectives. Over five key parts, Kanazawa introduces quantitative and qualitative approaches, mixed methods, and the special requirements of interdisciplinary research, emphasizing that methodological practice should be tailored to the specific needs of the project. Within these parts, detailed coverage is provided on key topics including the identification of a research project, hypothesis testing, spatial analysis, the case study method, ethnographic approaches, discourse analysis, mixed methods, survey and interview techniques, focus groups, and ethical issues in environmental research. Drawing on a variety of extended and updated examples to encourage problem-based learning and fully addressing the challenges associated with interdisciplinary investigation, this book will be an essential resource for students embarking on courses exploring research methods in environmental studies.
Modern Computational Techniques for Engineering Applications presents recent computational techniques used in the advancement of modern grids with the integration of non-conventional energy sources like wind and solar energy. It covers data analytics tools for smart cities, smart towns, and smart computing for sustainable development. This book- Discusses the importance of renewable energy source applications wind turbines and solar panels for electrical grids. Presents optimization-based computing techniques like fuzzy logic, neural networks, and genetic algorithms that enhance the computational speed. Showcases cloud computing tools and methodologies such as cybersecurity testbeds and data security for better accuracy of data. Covers novel concepts on artificial neural networks, fuzzy systems, machine learning, and artificial intelligence techniques. Highlights application-based case studies including cloud computing, optimization methods, and the Industrial Internet of Things. The book comprehensively introduces modern computational techniques, starting from basic tools to highly advanced procedures, and their applications. It further highlights artificial neural networks, fuzzy systems, machine learning, and artificial intelligence techniques and how they form the basis for algorithms. It presents application-based case studies on cloud computing, optimization methods, blockchain technology, fog and edge computing, and the Industrial Internet of Things. It will be a valuable resource for senior undergraduates, graduate students, and academic researchers in diverse fields, including electrical engineering, electronics and communications engineering, and computer engineering.
Geotechnical works involve complex geo-engineering issues, which are reviewed in this volume presenting the very latest research and practice in computational mechanics in geotechnical engineering. Application of Computational Mechanics in Geotechnical Engineering V contains contributions on soil and rock excavations, underground structures and ground reinforcement; and on the construction of dams, embankments and rail track. Other papers consider the geomechanics of oil exploration and rock mechanics in mining; while environmental contributions include groundwater management. A wide range of methodologies are discussed: inversed methodologies, artificial intelligence and computational systems, which highlight future trends in the area of computational mechanics applied to geotechnical problems. The book will be of interest to researchers, academics, students, software developers, and practical engineers across the field of geotechnics.
The IT Security Governance Guidebook with Security Program Metrics provides clear and concise explanations of key issues in information protection, describing the basic structure of information protection and enterprise protection programs. Including graphics to support the information in the text, this book includes both an overview of material as well as detailed explanations of specific issues. The accompanying downloadable resources offers a collection of metrics, formed from repeatable and comparable measurement, that are designed to correspond to the enterprise security governance model provided in the text, allowing an enterprise to measure its overall information protection program.
The process of developing predictive models includes many stages. Most resources focus on the modeling algorithms but neglect other critical aspects of the modeling process. This book describes techniques for finding the best representations of predictors for modeling and for nding the best subset of predictors for improving model performance. A variety of example data sets are used to illustrate the techniques along with R programs for reproducing the results.
This book covers the distinguishing characteristics and tropes of visual novels (VNs) as choice-based games and analyzes VNs like 999: Nine Hours, Nine Persons, Nine Doors; Hatoful Boyfriend; and Monster Prom, some of the best examples of the genre as illustrations. The author covers structuring branching narrative and plot, designing impactful and compelling choices, writing entertaining relationships and character interactions, understanding the importance of a VN's prose, and planning a VN's overall narrative design and story delivery. The book contains exercises at the end of chapters to practice the techniques discussed. By the end of the book, if the reader finishes all the exercises, they may have several portfolio pieces or a significant portion of their own VN project designed. Features: Discusses different aspects and genres of VNs, what makes them enjoyable, and successful techniques developers can incorporate into their own games Analyzes various VNs and choice-based games that use these successful techniques Shares tips from developers on portfolio pieces, hiring a team to work on VNs, and plotting and outlining VNs Branching Story, Unlocked Dialogue: Designing and Writing Visual Novels is a valuable resource for developers and narrative designers interested in working on VNs. The book will show them how they can design their own VN projects, design branching narratives, develop entertaining plots and relationships, design impactful and compelling choices, and write prose that's a pleasure to read.
What does the Coen Brothers' Barton Fink have in common with Norman McLaren's Synchromy? Or with audiovisual sculpture? Or contemporary music video? Composing Audiovisually interrogates how the relationship between the audiovisual media in these works, and our interaction with them, might allow us to develop mechanisms for talking about and understanding our experience of audiovisual media across a broad range of modes. Presenting close readings of audiovisual artefacts, conversations with artists, consideration of contemporary pedagogy and a detailed conceptual and theoretical framework that considers the nature of contemporary audiovisual experience, this book attempts to address gaps in our discourse on audiovisual modes, and offer possible starting points for future, genuinely transdisciplinary thinking in the field.
a short and accessible introduction on AI and Cars written by leading experts |
You may like...
Discovering Computers (c)2017
Mark Frydenberg, Misty Vermaat, …
Paperback
(3)
Discovering Computers, Essentials…
Susan Sebok, Jennifer Campbell, …
Paperback
Database Principles - Fundamentals of…
Carlos Coronel, Keeley Crockett, …
Paperback
Discovering Computers 2018 - Digital…
Misty Vermaat, Steven Freund, …
Paperback
|