|
|
Books > Computing & IT > Applications of computing
"Big data" has become a commonly used term to describe large-scale
and complex data sets which are difficult to manage and analyze
using standard data management methodologies. With applications
across sectors and fields of study, the implementation and possible
uses of big data are limitless. The Handbook of Research on Big
Data Management and Applications explores emerging research on the
ever-growing field of big data and facilitates further knowledge
development on methods for handling and interpreting large data
sets. Providing multi-disciplinary perspectives fueled by
international research, this publication is designed for use by
data analysts, IT professionals, researchers, and graduate-level
students interested in learning about the latest trends and
concepts in big data.
Learning-Based Local Visual Representation and Indexing, reviews
the state-of-the-art in visual content representation and indexing,
introduces cutting-edge techniques in learning based visual
representation, and discusses emerging topics in visual local
representation, and introduces the most recent advances in
content-based visual search techniques.
In honour of Professor Erkki Oja, one of the pioneers of
Independent Component Analysis (ICA), this book reviews key
advances in the theory and application of ICA, as well as its
influence on signal processing, pattern recognition, machine
learning, and data mining. Examples of topics which have developed
from the advances of ICA, which are covered in the book are: A
unifying probabilistic model for PCA and ICA Optimization methods
for matrix decompositions Insights into the FastICA algorithm
Unsupervised deep learning Machine vision and image retrieval
Multimedia technologies are becoming more sophisticated, enabling
the Internet to accommodate a rapidly growing audience with a full
range of services and efficient delivery methods. Although the
Internet now puts communication, education, commerce and
socialization at our finger tips, its rapid growth has raised some
weighty security concerns with respect to multimedia content. The
owners of this content face enormous challenges in safeguarding
their intellectual property, while still exploiting the Internet as
an important resource for commerce.
Data Hiding Fundamentals and Applications focuses on the theory and
state-of-the-art applications of content security and data hiding
in digital multimedia. One of the pillars of content security
solutions is the imperceptible insertion of information into
multimedia data for security purposes; the idea is that this
inserted information will allow detection of unauthorized usage.
* Provides a theoretical framework for data hiding, in a signal
processing context;
* Realistic applications in secure, multimedia delivery;
* Compression robust data hiding;
* Data hiding for proof of ownership--WATERMARKING;
* Data hiding algorithms for image and video watermarking.
Since its first volume in 1960, Advances in Computers has presented
detailed coverage of innovations in computer hardware, software,
theory, design, and applications. It has also provided contributors
with a medium in which they can explore their subjects in greater
depth and breadth than journal articles usually allow. As a result,
many articles have become standard references that continue to be
of significant, lasting value in this rapidly expanding field.
Due to its versatility and accessibility, individuals all around
the world routinely use various forms of technology to interact
with one another. Over the years, the design and development of
technologies and interfaces have increasingly aimed to improve the
human-computer interactive experience in unimaginable ways. The
Handbook of Research on Human-Computer Interfaces and New Modes of
Interactivity is a collection of innovative research on the methods
and applications of interactive technologies in the modern age.
Highlighting topics including digital environments, sensory
applications, and transmedia applications, this book is ideally
designed for academicians, researchers, HCI developers,
programmers, IT consultants, and media specialists seeking current
research on the design, application, and advancement of different
media technologies and interfaces that can support interaction
across a wide range of users.
Interfaces within computers, computing, and programming are
consistently evolving and continue to be relevant to computer
science as it progresses. Advancements in human-computer
interactions, their aesthetic appeal, ease of use, and learnability
are made possible due to the creation of user interfaces and result
in further growth in science, aesthetics, and practical
applications. Interface Support for Creativity, Productivity, and
Expression in Computer Graphics is a collection of innovative
research on usability, the apps humans use, and their sensory
environment. While highlighting topics such as image datasets,
augmented reality, and visual storytelling, this book is ideally
designed for researchers, academicians, graphic designers,
programmers, software developers, educators, multimedia
specialists, and students seeking current research on uniting
digital content with the physicality of the device through
applications, thus addressing sensory perception.
Digital image processing is a field that is constantly improving.
Gaining high-level understanding from digital images is a key
requirement for computing. One aspect of study that is assisting
with this advancement is fractal theory. This new science has
gained momentum and popularity as it has become a key topic of
research in the area of image analysis. Examining Fractal Image
Processing and Analysis is an essential reference source that
discusses fractal theory applications and analysis, including
box-counting analysis, multi-fractal analysis, 3D fractal analysis,
and chaos theory, as well as recent trends in other soft computing
techniques. Featuring research on topics such as image compression,
pattern matching, and artificial neural networks, this book is
ideally designed for system engineers, computer engineers,
professionals, academicians, researchers, and students seeking
coverage on problem-oriented processing techniques and imaging
technologies.
Developments in bio-inspired computation have impacted multiple
fields and created opportunities for new applications. In recent
years, these techniques have been increasingly integrated into
robotic systems. Membrane Computing for Distributed Control of
Robotic Swarms: Emerging Research and Opportunities is an
innovative reference source for the latest perspectives on
biologically-inspired computation techniques for robot design and
control. Highlighting a range of pivotal topics such as software
engineering, simulation tools, and robotic security, this book is
ideally designed for researchers, academics, students, and
practitioners interested in the role of membrane computing in
mobile robots.
Swarm Intelligence has recently emerged as a next-generation
methodology belonging to the class of evolutionary computing. As a
result, scientists have been able to explain and understand
real-life processes and practices that previously remained
unexplored. The Handbook of Research on Swarm Intelligence in
Engineering presents the latest research being conducted on diverse
topics in intelligence technologies such as Swarm Intelligence,
Machine Intelligence, Optical Engineering, and Signal Processing
with the goal of advancing knowledge and applications in this
rapidly evolving field. The enriched interdisciplinary contents of
this book will be a subject of interest to the widest forum of
faculties, existing research communities, and new research
aspirants from a multitude of disciplines and trades.
Language-that is, oral or written content that references abstract
concepts in subtle ways-is what sets us apart as a species, and in
an age defined by such content, language has become both the fuel
and the currency of our modern information society. This has posed
a vexing new challenge for linguists and engineers working in the
field of language-processing: how do we parse and process not just
language itself, but language in vast, overwhelming quantities?
Modern Computational Models of Semantic Discovery in Natural
Language compiles and reviews the most prominent linguistic
theories into a single source that serves as an essential reference
for future solutions to one of the most important challenges of our
age. This comprehensive publication benefits an audience of
students and professionals, researchers, and practitioners of
linguistics and language discovery. This book includes a
comprehensive range of topics and chapters covering digital media,
social interaction in online environments, text and data mining,
language processing and translation, and contextual documentation,
among others.
Image and Video Processing is an active area of research due to its
potential applications for solving real-world problems. Integrating
computational intelligence to analyze and interpret information
from image and video technologies is an essential step to
processing and applying multimedia data. Emerging Technologies in
Intelligent Applications for Image and Video Processing presents
the most current research relating to multimedia technologies
including video and image restoration and enhancement as well as
algorithms used for image and video compression, indexing and
retrieval processes, and security concerns. Featuring insight from
researchers from around the world, this publication is designed for
use by engineers, IT specialists, researchers, and graduate level
students.
COMMUNICATION NETWORKS AND SERVICE MANAGEMENT IN THE ERA OF
ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING Discover the impact
that new technologies are having on communication systems with this
up-to-date and one-stop resource Communication Networks and Service
Management in the Era of Artificial Intelligence and Machine
Learning delivers a comprehensive overview of the impact of
artificial intelligence (AI) and machine learning (ML) on service
and network management. Beginning with a fulsome description of ML
and AI, the book moves on to discuss management models,
architectures, and frameworks. The authors also explore how AI and
ML can be used in service management functions like the generation
of workload profiles, service provisioning, and more. The book
includes a handpicked selection of applications and case studies,
as well as a treatment of emerging technologies the authors predict
could have a significant impact on network and service management
in the future. Statistical analysis and data mining are also
discussed, particularly with respect to how they allow for an
improvement of the management and security of IT systems and
networks. Readers will also enjoy topics like: A thorough
introduction to network and service management, machine learning,
and artificial intelligence An exploration of artificial
intelligence and machine learning for management models, including
autonomic management, policy-based management, intent based
-management, and network virtualization-based management
Discussions of AI and ML for architectures and frameworks,
including cloud -systems, software defined networks, 5G and 6G
networks, and Edge/Fog networks An examination of AI and ML for
service management, including the automatic -generation of workload
profiles using unsupervised learning Perfect for information and
communications technology educators, Communication Networks and
Service Management in the Era of Artificial Intelligence and
Machine Learning will also earn a place in the libraries of
engineers and professionals who seek a structured reference on how
the emergence of artificial intelligence and machine learning
techniques is affecting service and network management.
Cryptography is concerned with the construction of schemes that
withstand any abuse. A cryptographic scheme is constructed so as to
maintain a desired functionality, even under malicious attempts
aimed at making it deviate from its prescribed behavior. The design
of cryptographic systems must be based on firm foundations, whereas
ad hoc approaches and heuristics are a very dangerous way to go.
These foundations were developed mostly in the 1980s, in works that
are all co-authored by Shafi Goldwasser and/or Silvio Micali. These
works have transformed cryptography from an engineering discipline,
lacking sound theoretical foundations, into a scientific field
possessing a well-founded theory, which influences practice as well
as contributes to other areas of theoretical computer science. This
book celebrates these works, which were the basis for bestowing the
2012 A.M. Turing Award upon Shafi Goldwasser and Silvio Micali. A
significant portion of this book reproduces some of these works,
and another portion consists of scientific perspectives by some of
their former students. The highlight of the book is provided by a
few chapters that allow the readers to meet Shafi and Silvio in
person. These include interviews with them, their biographies and
their Turing Award lectures.
With the proliferation of devices connected to the internet and
connected to each other, the volume of data collected, stored, and
processed is increasing every day, which brings new challenges in
terms of information security. As big data expands with the help of
public clouds, traditional security solutions tailored to private
computing infrastructures and confined to a well-defined security
perimeter, such as firewalls and demilitarized zones (DMZs), are no
longer effective. New security functions are required to work over
the heterogenous composition of diverse hardware, operating
systems, and network domains. Security, Privacy, and Forensics
Issues in Big Data is an essential research book that examines
recent advancements in big data and the impact that these
advancements have on information security and privacy measures
needed for these networks. Highlighting a range of topics including
cryptography, data analytics, and threat detection, this is an
excellent reference source for students, software developers and
engineers, security analysts, IT consultants, academicians,
researchers, and professionals.
The world we live in presents plenty of tricky, impactful, and
hard-tomake decisions to be taken. Sometimes the available options
are ample, at other times they are apparently binary, either way,
they often confront us with dilemmas, paradoxes, and even denial of
values.In the dawn of the age of intelligence, when robots are
gradually taking over most decision-making from humans, this book
sheds a bit of light on decision rationale. It delves into the
limits of these decision processes (for both humans and machines),
and it does so by providing a new perspective that is somehow
opposed to orthodox economics. All Economics reflections in this
book are underlined and linked to Artificial Intelligence.The
authors hope that this comprehensive and modern analysis, firmly
grounded in the opinions of various groundbreaking Nobel laureate
economists, may be helpful to a broad audience interested in how
decisions may lead us all to flourishing societies. That is,
societies in which economic blunders (caused by over simplification
of problems and super estimation of tools) are reduced
substantially.
Security video surveillance systems, such as homeland security and
national defence, rely on specific mathematical algorithms in order
to run effectively. It is essential for these parameters to be
understood in order to design and create a successful system. Video
Surveillance Techniques and Technologies presents empirical
research and acquired experience on the original solutions and
mathematical algorithms for motion detection and object
identification problems. Emphasising a wide variety of applications
of security systems, this book is an essential tool for graduate
students and professionals in the field of signal and image
processing applied in static/moving object detection, tracking, and
identification.
The rapid advancements in telecommunications, computing hardware
and software, and data encryption, and the widespread use of
electronic data processing and electronic business conducted
through the Internet have led to a strong increase in information
security threats. The latest advances in information security have
increased practical deployments and scalability across a wide range
of applications to better secure and protect our information
systems and the information stored, processed and transmitted. This
book outlines key emerging trends in information security from the
foundations and technologies in biometrics, cybersecurity, and big
data security to applications in hardware and embedded systems
security, computer forensics, the Internet of Things security, and
network security. Information Security: Foundations, technologies
and applications is a comprehensive review of cutting-edge
algorithms, technologies, and applications, and provides new
insights into a range of fundamentally important topics in the
field. This up-to-date body of knowledge is essential reading for
researchers and advanced students in information security, and for
professionals in sectors where information security is required.
 |
TLS Mastery
(Hardcover)
Michael W Lucas
|
R893
R812
Discovery Miles 8 120
Save R81 (9%)
|
Ships in 18 - 22 working days
|
|
|
Augmented Reality (AR) is the blending of digital information in a
real-world environment. A common example can be seen during any
televised football game, in which information about the game is
digitally overlaid on the field as the players move and position
themselves. Another application is Google Glass, which enables
users to see AR graphics and information about their location and
surroundings on the lenses of their "digital eyewear", changing in
real-time as they move about. Augmented Reality Law, Privacy, and
Ethics is the first book to examine the social, legal, and ethical
issues surrounding AR technology. Digital eyewear products have
very recently thrust this rapidly-expanding field into the
mainstream, but the technology is so much more than those devices.
Industry analysts have dubbed AR the "eighth mass medium" of
communications. Science fiction movies have shown us the promise of
this technology for decades, and now our capabilities are finally
catching up to that vision. Augmented Reality will influence
society as fundamentally as the Internet itself has done, and such
a powerful medium cannot help but radically affect the laws and
norms that govern society. No author is as uniquely qualified to
provide a big-picture forecast and guidebook for these developments
as Brian Wassom. A practicing attorney, he has been writing on AR
law since 2007 and has established himself as the world's foremost
thought leader on the intersection of law, ethics, privacy, and AR.
Augmented Reality professionals around the world follow his
Augmented Legality (R) blog. This book collects and expands upon
the best ideas expressed in that blog, and sets them in the context
of a big-picture forecast of how AR is shaping all aspects of
society.
Emerging Trends in Image Processing, Computer Vision, and Pattern
Recognition discusses the latest in trends in imaging science which
at its core consists of three intertwined computer science fields,
namely: Image Processing, Computer Vision, and Pattern Recognition.
There is significant renewed interest in each of these three fields
fueled by Big Data and Data Analytic initiatives including but not
limited to; applications as diverse as computational biology,
biometrics, biomedical imaging, robotics, security, and knowledge
engineering. These three core topics discussed here provide a solid
introduction to image processing along with low-level processing
techniques, computer vision fundamentals along with examples of
applied applications and pattern recognition algorithms and
methodologies that will be of value to the image processing and
computer vision research communities. Drawing upon the knowledge of
recognized experts with years of practical experience and
discussing new and novel applications Editors' Leonidas
Deligiannidis and Hamid Arabnia cover; Many perspectives of image
processing spanning from fundamental mathematical theory and
sampling, to image representation and reconstruction, filtering in
spatial and frequency domain, geometrical transformations, and
image restoration and segmentation Key application techniques in
computer vision some of which are camera networks and vision, image
feature extraction, face and gesture recognition and biometric
authentication Pattern recognition algorithms including but not
limited to; Supervised and unsupervised classification algorithms,
Ensemble learning algorithms, and parsing algorithms. How to use
image processing and visualization to analyze big data.
|
You may like...
Zong!
M. Nourbese Philip
Paperback
R415
R381
Discovery Miles 3 810
|