![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Applications of computing
Research in the domains of learning analytics and educational data mining has prototyped an approach where methodologies from data science and machine learning are used to gain insights into the learning process by using large amounts of data. As many training and academic institutions are maturing in their data-driven decision making, useful, scalable, and interesting trends are emerging. Organizations can benefit from sharing information on those efforts. Applying Data Science and Learning Analytics Throughout a Learner's Lifespan examines novel and emerging applications of data science and sister disciplines for gaining insights from data to inform interventions into learners' journeys and interactions with academic institutions. Data is collected at various times and places throughout a learner's lifecycle, and the learners and the institution should benefit from the insights and knowledge gained from this data. Covering topics such as learning analytics dashboards, text network analysis, and employment recruitment, this book is an indispensable resource for educators, computer scientists, faculty of higher education, government officials, educational administration, students of higher education, pre-service teachers, business professionals, researchers, and academicians.
In recent years, there have been significant progress in computational intelligence and image processing with machine learning and deep learning as important components of modern artificial intelligence. All these progresses face challenges in dealing with Covid-19 pandemic for detection and treatment.This comprehensive compendium provides not only updated advances of computational intelligence and image processing in the detection and treatment of Covid-19, but also other medical applications such as in cancer detection and cardiovascular diseases, etc. More traditional approaches such as 2D segmentation and 3D reconstruction are included.The useful reference text is an updated version of the edited title, Computer Vision in Medical Imaging (World Scientific, 2014) and its companion volume, Frontiers of Medical Imaging (World Scientific, 2015). The book is written for engineers, scientists and the medical community to meet the increased challenges in medical applications.
As various areas of discipline continue to progress into the digital age, diverse modes of technology are being experimented with and ultimately implemented into common practices. Mobile products and interactive devices, specifically, are being tested within educational environments as well as corporate business in support of online learning and e-commerce initiatives. There is a boundless stock of factors that play a role in successfully implementing web technologies and user-driven learning strategies, which require substantial research for executives and administrators in these fields. Handbook of Research on User Experience in Web 2.0 Technologies and Its Impact on Universities and Businesses is an essential reference source that presents research on the strategic role of user experience in e-learning and e-commerce at the level of the global economy, networks and organizations, teams and work groups, and information systems. The book assesses the impact of e-learning and e-commerce technologies on different organizations, including higher education institutions, multinational corporations, health providers, and business companies. Featuring research on topics such as ubiquitous interfaces, computer graphics, and image processing, this book is ideally designed for program developers and designers, researchers, practitioners, IT professionals, executives, academicians, and students.
Increasingly, human beings are sensors engaging directly with the mobile Internet. Individuals can now share real-time experiences at an unprecedented scale. Social Sensing: Building Reliable Systems on Unreliable Data looks at recent advances in the emerging field of social sensing, emphasizing the key problem faced by application designers: how to extract reliable information from data collected from largely unknown and possibly unreliable sources. The book explains how a myriad of societal applications can be derived from this massive amount of data collected and shared by average individuals. The title offers theoretical foundations to support emerging data-driven cyber-physical applications and touches on key issues such as privacy. The authors present solutions based on recent research and novel ideas that leverage techniques from cyber-physical systems, sensor networks, machine learning, data mining, and information fusion.
Across numerous industries in modern society, there is a constant need to gather precise and relevant data efficiently and quickly. As such, it is imperative to research new methods and approaches to increase productivity in these areas. Next-Generation Information Retrieval and Knowledge Resources Management is a key source on the latest advancements in multidisciplinary research methods and applications and examines effective techniques for managing and utilizing information resources. Featuring extensive coverage across a range of relevant perspectives and topics, such as knowledge discovery, spatial indexing, and data mining, this book is ideally designed for researchers, graduate students, academics, and industry professionals seeking ways to optimize knowledge management processes.
Data is the base for information, information is needed to have knowledge, and knowledge is used to make decisions and manage 21st century businesses and organizations. Thus, it is imperative to remain up to date on the major breakthroughs within the technological arena in order to continually expand and enhance knowledge for the benefit of all institutions. Information Technology Trends for a Global and Interdisciplinary Research Community is a crucial reference source that covers novel and emerging research in the field of information science and technology, specifically focusing on underrepresented technologies and trends that influence and engage the knowledge society. While highlighting topics that include computational thinking, knowledge management, artificial intelligence, and visualization, this book is essential for academicians, researchers, and students with an interest in information management.
Communities of Computing is the first book-length history of the Association for Computing Machinery (ACM), founded in 1947 and with a membership today of 100,000 worldwide. It profiles ACM's notable SIGs, active chapters, and individual members, setting ACM's history into a rich social and political context. The book's 12 core chapters are organized into three thematic sections. "Defining the Discipline" examines the 1960s and 1970s when the field of computer science was taking form at the National Science Foundation, Stanford University, and through ACM's notable efforts in education and curriculum standards. "Broadening the Profession" looks outward into the wider society as ACM engaged with social and political issues - and as members struggled with balancing a focus on scientific issues and awareness of the wider world. Chapters examine the social turbulence surrounding the Vietnam War, debates about the women's movement, efforts for computing and community education, and international issues including professionalization and the Cold War. "Expanding Research Frontiers" profiles three areas of research activity where ACM members and ACM itself shaped notable advances in computing, including computer graphics, computer security, and hypertext. Featuring insightful profiles of notable ACM leaders, such as Edmund Berkeley, George Forsythe, Jean Sammet, Peter Denning, and Kelly Gotlieb, and honest assessments of controversial episodes, the volume deals with compelling and complex issues involving ACM and computing. It is not a narrow organizational history of ACM committees and SIGS, although much information about them is given. All chapters are original works of research. Many chapters draw on archival records of ACM's headquarters, ACM SIGs, and ACM leaders. This volume makes a permanent contribution to documenting the history of ACM and understanding its central role in the history of computing.
Bio-inspired computation, especially those based on swarm intelligence, has become increasingly popular in the last decade. Bio-Inspired Computation in Telecommunications reviews the latest developments in bio-inspired computation from both theory and application as they relate to telecommunications and image processing, providing a complete resource that analyzes and discusses the latest and future trends in research directions. Written by recognized experts, this is a must-have guide for researchers, telecommunication engineers, computer scientists and PhD students.
CORPORATE CYBERSECURITY An insider's guide showing companies how to spot and remedy vulnerabilities in their security programs A bug bounty program is offered by organizations for people to receive recognition and compensation for reporting bugs, especially those pertaining to security exploits and vulnerabilities. Corporate Cybersecurity gives cyber and application security engineers (who may have little or no experience with a bounty program) a hands-on guide for creating or managing an effective bug bounty program. Written by a cyber security expert, the book is filled with the information, guidelines, and tools that engineers can adopt to sharpen their skills and become knowledgeable in researching, configuring, and managing bug bounty programs. This book addresses the technical aspect of tooling and managing a bug bounty program and discusses common issues that engineers may run into on a daily basis. The author includes information on the often-overlooked communication and follow-through approaches of effective management. Corporate Cybersecurity provides a much-needed resource on how companies identify and solve weaknesses in their security program. This important book: Contains a much-needed guide aimed at cyber and application security engineers Presents a unique defensive guide for understanding and resolving security vulnerabilities Encourages research, configuring, and managing programs from the corporate perspective Topics covered include bug bounty overview; program set-up; vulnerability reports and disclosure; development and application Security Collaboration; understanding safe harbor and SLA Written for professionals working in the application and cyber security arena, Corporate Cybersecurity offers a comprehensive resource for building and maintaining an effective bug bounty program.
As the world has adapted to the age of digital technology, present day business leaders are required to change with the times as well. Addressing and formatting their business practices to not only encompass digital technologies, but expand their capabilities, the leaders of today must be flexible and willing to familiarize themselves with all types of global business practices. Global Business Leadership Development for the Fourth Industrial Revolution is a collection of advanced research on the methods and tactics utilized to succeed as a leader in the digital age. While highlighting topics including data privacy, corporate governance, and risk management, this book is ideally designed for business professionals, administrators, managers, executives, researchers, academicians, and business students who want to improve their understanding of the strategic role of digital technologies in the global economy, in networks and organizations, in teams and work groups, in information systems, and at the level of individuals as actors in digitally networked environments.
Computational Materials Engineering: Achieving High Accuracy and Efficiency in Metals Processing Simulations describes the most common computer modeling and simulation techniques used in metals processing, from so-called "fast" models to more advanced multiscale models, also evaluating possible methods for improving computational accuracy and efficiency. Beginning with a discussion of conventional fast models like internal variable models for flow stress and microstructure evolution, the book moves on to advanced multiscale models, such as the CAFE method, which give insights into the phenomena occurring in materials in lower dimensional scales. The book then delves into the various methods that have been developed to deal with problems, including long computing times, lack of proof of the uniqueness of the solution, difficulties with convergence of numerical procedures, local minima in the objective function, and ill-posed problems. It then concludes with suggestions on how to improve accuracy and efficiency in computational materials modeling, and a best practices guide for selecting the best model for a particular application.
Have you ever looked at your Library's key performance indicators and said to yourself "so what!"? Have you found yourself making decisions in a void due to the lack of useful and easily accessible operational data? Have you ever worried that you are being left behind with the emergence of data analytics? Do you feel there are important stories in your operational data that need to be told, but you have no idea how to find these stories? If you answered yes to any of these questions, then this book is for you. How Libraries Should Manage Data provides detailed instructions on how to transform your operational data from a fog of disconnected, unreliable, and inaccessible information - into an exemplar of best practice data management. Like the human brain, most people are only using a very small fraction of the true potential of Excel. Learn how to tap into a greater proportion of Excel's hidden power, and in the process transform your operational data into actionable business intelligence.
Modern society exists in a digital era in which high volumes of multimedia information exists. To optimize the management of this data, new methods are emerging for more efficient information retrieval. Web Semantics for Textual and Visual Information Retrieval is a pivotal reference source for the latest academic research on embedding and associating semantics with multimedia information to improve data retrieval techniques. Highlighting a range of pertinent topics such as automation, knowledge discovery, and social networking, this book is ideally designed for researchers, practitioners, students, and professionals interested in emerging trends in information retrieval.
High-performance computing (HPC) describes the use of connected computing units to perform complex tasks. It relies on parallelization techniques and algorithms to synchronize these disparate units in order to perform faster than a single processor could, alone. Used in industries from medicine and research to military and higher education, this method of computing allows for users to complete complex data-intensive tasks. This field has undergone many changes over the past decade, and will continue to grow in popularity in the coming years. Innovative Research Applications in Next-Generation High Performance Computing aims to address the future challenges, advances, and applications of HPC and related technologies. As the need for such processors increases, so does the importance of developing new ways to optimize the performance of these supercomputers. This timely publication provides comprehensive information for researchers, students in ICT, program developers, military and government organizations, and business professionals.
Combinatorial optimization is a multidisciplinary scientific area, lying in the interface of three major scientific domains: mathematics, theoretical computer science and management. The three volumes of the Combinatorial Optimization series aim to cover a wide range of topics in this area. These topics also deal with fundamental notions and approaches as with several classical applications of combinatorial optimization. Concepts of Combinatorial Optimization, is divided into three parts: - On the complexity of combinatorial optimization problems, presenting basics about worst-case and randomized complexity; - Classical solution methods, presenting the two most-known methods for solving hard combinatorial optimization problems, that are Branch-and-Bound and Dynamic Programming; - Elements from mathematical programming, presenting fundamentals from mathematical programming based methods that are in the heart of Operations Research since the origins of this field.
Data Mining for Bioinformatics Applications provides valuable information on the data mining methods have been widely used for solving real bioinformatics problems, including problem definition, data collection, data preprocessing, modeling, and validation. The text uses an example-based method to illustrate how to apply data mining techniques to solve real bioinformatics problems, containing 45 bioinformatics problems that have been investigated in recent research. For each example, the entire data mining process is described, ranging from data preprocessing to modeling and result validation.
Text analysis tools aid in extracting meaning from digital content. As digital text becomes more and more complex, new techniques are needed to understand conceptual structure. Concept Parsing Algorithms (CPA) for Textual Analysis and Discovery: Emerging Research and Opportunities provides an innovative perspective on the application of algorithmic tools to study unstructured digital content. Highlighting pertinent topics such as semantic tools, semiotic systems, and pattern detection, this book is ideally designed for researchers, academics, students, professionals, and practitioners interested in developing a better understanding of digital text analysis.
Since its first volume in 1960, Advances in Computers has presented detailed coverage of innovations in computer hardware, software, theory, design, and applications. It has also provided contributors with a medium in which they can explore their subjects in greater depth and breadth than journal articles usually allow. As a result, many articles have become standard references that continue to be of significant, lasting value in this rapidly expanding field.
This collection represents the primary reference work for
researchers and students in the area of Temporal Reasoning in
Artificial Intelligence. Temporal reasoning has a vital role to
play in many areas, particularly Artificial Intelligence. Yet,
until now, there has been no single volume collecting together the
breadth of work in this area. This collection brings together the
leading researchers in a range of relevant areas and provides an
coherent description of the breadth of activity concerning temporal
reasoning in the filed of Artificial Intelligence.
Despite advancements in technological and engineering fields, there is still a digital gender divide in the adoption, use, and development of information communication technology (ICT) services. This divide is also evident in educational environments and careers, specifically in the STEM fields. In order to mitigate this divide, policy approaches must be addressed and improved in order to encourage the inclusion of women in ICT disciplines. Gender Gaps and the Social Inclusion Movement in ICT provides emerging research exploring the theoretical and practical aspects of gender and policy from developed and developing country perspectives and its applications within ICT through various forms of research including case studies. Featuring coverage on a broad range of topics such as digital identity, human rights, and social inclusion, this book is ideally designed for policymakers, academicians, researchers, students, and technology developers seeking current research on gender inequality in ICT environments.
Language-that is, oral or written content that references abstract concepts in subtle ways-is what sets us apart as a species, and in an age defined by such content, language has become both the fuel and the currency of our modern information society. This has posed a vexing new challenge for linguists and engineers working in the field of language-processing: how do we parse and process not just language itself, but language in vast, overwhelming quantities? Modern Computational Models of Semantic Discovery in Natural Language compiles and reviews the most prominent linguistic theories into a single source that serves as an essential reference for future solutions to one of the most important challenges of our age. This comprehensive publication benefits an audience of students and professionals, researchers, and practitioners of linguistics and language discovery. This book includes a comprehensive range of topics and chapters covering digital media, social interaction in online environments, text and data mining, language processing and translation, and contextual documentation, among others. |
You may like...
Discovering Computers 2018 - Digital…
Misty Vermaat, Steven Freund, …
Paperback
Management Of Information Security
Michael Whitman, Herbert Mattord
Paperback
|