![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Applications of computing
Fog computing is quickly increasing its applications and uses to the next level. As it continues to grow, different types of virtualization technologies can thrust this branch of computing further into mainstream use. The Handbook of Research on Cloud and Fog Computing Infrastructures for Data Science is a key reference volume on the latest research on the role of next-generation systems and devices that are capable of self-learning and how those devices will impact society. Featuring wide-ranging coverage across a variety of relevant views and themes such as cognitive analytics, data mining algorithms, and the internet of things, this publication is ideally designed for programmers, IT professionals, students, researchers, and engineers looking for innovative research on software-defined cloud infrastructures and domain-specific analytics.
The internet provides a vast amount of data which can be utilised to explore different approaches to solving industry problems. Efficient methods for the retrieval of this information are essential for streamlined business processes. Information Retrieval Methods for Multidisciplinary Applications provides innovative research on information gathering, web data mining, and automation systems. Addressing multidisciplinary applications and focusing on theories and methods with an enterprise-wide perspective, this book is essential for information engineers, scientists, and related professionals.
Blockchain technology presents numerous advantages that include increased transparency, reduced transaction costs, faster transaction settlement, automation of information, increased traceability, improved customer experience, improved digital identity, better cyber security, and user-controlled networks. These potential applications are widespread and diverse including funds transfer, smart contracts, e-voting, efficient supply chain, and more in nearly every sector of society including finance, healthcare, law, trade, real estate, and other important areas. However, there are challenges and limitations that exist such as high energy consumption, limited scalability, complexity, security, network size, lack of regulations, and other critical issues. Nevertheless, blockchain is an attractive technology and has much to offer to the modern-day industry. Industry Use Cases on Blockchain Technology Applications in IoT and the Financial Sector investigates blockchain technology's adoption and effectiveness in multiple industries and for the internet of things (IoT)-based applications, presents use cases from industrial and financial sectors as well as from other transaction-based services, and fills a gap in this respect by extending the existing body of knowledge in the suggested field. While highlighting topics such as cybersecurity, use cases, and models for blockchain implementation, this book is ideal for business managers, financial accountants, practitioners, researchers, academicians, and students interested in blockchain technology's role and implementation in IoT and the financial sector.
This textbook offers an insightful study of the intelligent Internet-driven revolutionary and fundamental forces at work in society. Readers will have access to tools and techniques to mentor and monitor these forces rather than be driven by changes in Internet technology and flow of money. These submerged social and human forces form a powerful synergistic foursome web of (a) processor technology, (b) evolving wireless networks of the next generation, (c) the intelligent Internet, and (d) the motivation that drives individuals and corporations. In unison, the technological forces can tear human lives apart for the passive or provide a cohesive set of opportunities for the knowledgeable to lead and reap the rewards in the evolved knowledge society. The book also provides in-depth coverage of the functions
embedded in modern processors and intelligent communication
networks. It focuses on the convergence of the design of modern
processor technologies with the switching and routing methodologies
of global intelligent networks. Most of the concepts that are
generic to the design of terra-flop parallel processors and the
terra-bit fiber-optic networks are presented. This book also
highlights recent developments in computer and processor
technologies into the microscopic and macroscopic medical functions
in hospitals and medical centers.
"Calculus of Thought: Neuromorphic Logistic Regression in Cognitive Machines" is a must-read for all scientists about a very simple computation method designed to simulate big-data neural processing. This book is inspired by the Calculus Ratiocinator idea of Gottfried Leibniz, which is that machine computation should be developed to simulate human cognitive processes, thus avoiding problematic subjective bias in analytic solutions to practical and scientific problems. The reduced error logistic regression (RELR) method is proposed
as such a "Calculus of Thought." This book reviews how RELR's
completely automated processing may parallel important aspects of
explicit and implicit learning in neural processes. It emphasizes
the fact that RELR is really just a simple adjustment to already
widely used logistic regression, along with RELR's new applications
that go well beyond standard logistic regression in prediction and
explanation. Readers will learn how RELR solves some of the most
basic problems in today s big and small data related to high
dimensionality, multi-colinearity, and cognitive bias in capricious
outcomes commonly involving human behavior.
The growing presence of biologically-inspired processing has caused significant changes in data retrieval. With the ubiquity of these technologies, more effective and streamlined data processing techniques are available. Bio-Inspired Computing for Information Retrieval Applications is a key resource on the latest advances and research regarding current techniques that have evolved from biologically-inspired processes and its application to a variety of problems. Highlighting multidisciplinary studies on data processing, swarm-based clustering, and evolutionary computation, this publication is an ideal reference source for researchers, academics, professionals, students, and practitioners.
In recent years, swarm intelligence has become a popular computational approach among researchers working on optimization problems throughout the globe. Several algorithms inside swarm intelligence have been implemented due to their application to real-world issues and other advantages. A specific procedure, Fireworks Algorithm, is an emerging method that studies the explosion process of fireworks within local areas. Applications of this developing program are undiscovered, and research is necessary for scientists to fully understand the workings of this innovative system. The Handbook of Research on Fireworks Algorithms and Swarm Intelligence is a pivotal reference source that provides vital research on theory analysis, improvements, and applications of fireworks algorithm. While highlighting topics such as convergence rate, parameter applications, and global optimization analysis, this publication explores up-to-date progress on the specific techniques of this algorithm. This book is ideally designed for researchers, data scientists, mathematicians, engineers, software developers, postgraduates, and academicians seeking coverage on this evolutionary computation method.
An intellectual property discussion is central to qualitative research projects, and ethical guidelines are essential to the safe accomplishment of research projects. Undertaking research studies without adhering to ethics may be dangerous to researchers and research subjects. Therefore, it is important to understand and develop practical techniques for handling ethics with a specific focus on qualitative projects so that researchers conducting this type of research may continue to use ethical practices at every step of the project. Data Analysis and Methods of Qualitative Research: Emerging Research and Opportunities discusses in detail the methods related to the social constructionist paradigm that is popular with qualitative research projects. These methods help researchers undertake ideal qualitative projects that are free from quantitative research techniques/concepts all while acquiring practical skills in handling ethics and ethical issues in qualitative projects. The chapters each contain case studies, learning outcomes, question and answer sections, and discuss critical research philosophies in detail along with topics such as ethics, research design, data gathering and sampling methods, research outputs, data analysis, and report writing. Featuring a wide range of topics such as epistemology, probability sampling, and big data, this book is ideal for researchers, practitioners, computer scientists, academicians, analysts, coders, and students looking to become competent qualitative research specialists.
Image and Video Processing is an active area of research due to its potential applications for solving real-world problems. Integrating computational intelligence to analyze and interpret information from image and video technologies is an essential step to processing and applying multimedia data. Emerging Technologies in Intelligent Applications for Image and Video Processing presents the most current research relating to multimedia technologies including video and image restoration and enhancement as well as algorithms used for image and video compression, indexing and retrieval processes, and security concerns. Featuring insight from researchers from around the world, this publication is designed for use by engineers, IT specialists, researchers, and graduate level students.
Websites are a central part of today's business world; however, with the vast amount of information that constantly changes and the frequency of required updates, this can come at a high cost to modern businesses. Web Data Mining and the Development of Knowledge-Based Decision Support Systems is a key reference source on decision support systems in view of end user accessibility and identifies methods for extraction and analysis of useful information from web documents. Featuring extensive coverage across a range of relevant perspectives and topics, such as semantic web, machine learning, and expert systems, this book is ideally designed for web developers, internet users, online application developers, researchers, and faculty.
The concept of digital risk, which has become ubiquitous in the media, sustains a number of myths and beliefs about the digital world. This book explores the opposite view of these ideologies by focusing on digital risks as perceived by actors in their respective contexts. Perceptions and Analysis of Digital Risks identifies the different types of risks that concern actors and actually impact their daily lives, within education or various socio-professional environments. It provides an analysis of the strategies used by the latter to deal with these risks as they conduct their activities; thus making it possible to characterize the digital cultures and, more broadly, the informational cultures at work. This book offers many avenues for action in terms of educating the younger generations, training teachers and leaders, and mediating risks.
The theory of computation is used to address challenges arising in many computer science areas such as artificial intelligence, language processors, compiler writing, information and coding systems, programming language design, computer architecture and more. To grasp topics concerning this theory readers need to familiarize themselves with its computational and language models, based on concepts of discrete mathematics including sets, relations, functions, graphs and logic. This handbook introduces with rigor the important concepts of this kind and uses them to cover the most important mathematical models for languages and computation, such as various classical as well as modern automata and grammars. It explains their use in such crucially significant topics of computation theory as computability, decidability, and computational complexity. The authors pay special attention to the implementation of all these mathematical concepts and models and explains clearly how to encode them in computational practice. All computer programs are written in C#.
Recent advances in eye tracking technology will allow for a proliferation of new applications. Improvements in interactive methods using eye movement and gaze control could result in faster and more efficient human computer interfaces, benefitting users with and without disabilities. Gaze Interaction and Applications of Eye Tracking: Advances in Assistive Technologies focuses on interactive communication and control tools based on gaze tracking, including eye typing, computer control, and gaming, with special attention to assistive technologies. For researchers and practitioners interested in the applied use of gaze tracking, the book offers instructions for building a basic eye tracker from off-the-shelf components, gives practical hints on building interactive applications, presents smooth and efficient interaction techniques, and summarizes the results of effective research on cutting edge gaze interaction applications.
Statistical learning and analysis techniques have become extremely important today, given the tremendous growth in the size of heterogeneous data collections and the ability to process it even from physically distant locations. Recent advances made in the field of machine learning provide a strong framework for robust learning from the diverse corpora and continue to impact a variety of research problems across multiple scientific disciplines. The aim of this handbook is to familiarize beginners as well as experts with some of the recent techniques in this field. The Handbook is divided in two sections: Theory and
Applications, covering machine learning, data analytics,
biometrics, document recognition and security. emphasis on applications-oriented techniques
Swarm Intelligence and bio-inspired computation have become
increasing popular in the last two decades. Bio-inspired algorithms
such as ant colony algorithms, bat algorithms, bee algorithms,
firefly algorithms, cuckoo search and particle swarm optimization
have been applied in almost every area of science and engineering
with a dramatic increase of number of relevant publications. This
book reviews the latest developments in swarm intelligence and
bio-inspired computation from both the theory and application side,
providing a complete resource that analyzes and discusses the
latest and future trends in research directions. It can help new
researchers to carry out timely research and inspire readers to
develop new algorithms. With its impressive breadth and depth, this
book will be useful for advanced undergraduate students, PhD
students and lecturers in computer science, engineering and science
as well as researchers and engineers.
Modern devices, from phones and cars to houses and the appliances within them, are being designed with formidable computational power and expanded functionality. To be truly effective, these smart devices must effectively process data from their environment and experiences and make decisions based on that information. Recent Advances in Ambient Intelligence and Context-Aware Computing investigates the functionality of ubiquitous computational systems and how they may adapt to their environment to improve the quality of interaction for the end-user. This reference book will be of value to under- and post-graduate students, professionals, and researchers networking, computer science, communications, and other information technology disciplines.
Medical and technological organizations have recently developed therapy and assistance solutions that venture beyond what is considered conventional for individuals with various mental health conditions and behavioral disorders such as autism, Down syndrome, Alzheimer's disease, anxiety disorders, phobias, and learning difficulties. Through the use of virtual and augmented reality, researchers are working to provide alternative therapy methods to treat these conditions, while studying the long-term effects the treatment has on patients. Virtual and Augmented Reality in Mental Health Treatment provides innovative insights into the use and durability of virtual reality as a treatment for various behavioral and emotional disorders and health problems. The content within this publication represents the work of e-learning, digital psychology, and quality of care. It is designed for psychologists, psychiatrists, professionals, medical staff, educators, and researchers, and covers topics centered on medical and therapeutic applications of artificial intelligence and simulated environment.
Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who want just enough information about encryption to use it safely and securely and appropriately--WITHOUT having to become experts in cryptography. Data encryption is a powerful tool, if used properly. Encryption turns ordinary, readable data into what looks like gibberish, but gibberish that only the end user can turn back into readable data again. The difficulty of encryption has much to do with deciding what kinds of threats one needs to protect against and then using the proper tool in the correct way. It's kind of like a manual transmission in a car: learning to drive with one is easy; learning to build one is hard. The goal of this title is to present just enough for an average reader to begin protecting his or her data, immediately. Books and articles currently available about encryption start out with statistics and reports on the costs of data loss, and quickly get bogged down in cryptographic theory and jargon followed by attempts to comprehensively list all the latest and greatest tools and techniques. After step-by-step walkthroughs of the download and install process, there's precious little room left for what most readers really want: how to encrypt a thumb drive or email message, or digitally sign a data file. There are terabytes of content that explain how cryptography works, why it's important, and all the different pieces of software that can be used to do it; there is precious little content available that couples concrete threats to data with explicit responses to those threats. This title fills that niche. By reading this title readers will be provided with a step by step hands-on guide that includes: Simple descriptions of actual threat scenarios Simple, step-by-step instructions for securing data How to use open source, time-proven and peer-reviewed cryptographic software Easy to follow tips for safer computing Unbiased and platform-independent coverage of encryption tools
and techniques
This book provides a snapshot of the state of current research at the interface between machine learning and healthcare with special emphasis on machine learning projects that are (or are close to) achieving improvement in patient outcomes. The book provides overviews on a range of technologies including detecting artefactual events in vital signs monitoring data; patient physiological monitoring; tracking infectious disease; predicting antibiotic resistance from genomic data; and managing chronic disease. With contributions from an international panel of leading researchers, this book will find a place on the bookshelves of academic and industrial researchers and advanced students working in healthcare technologies, biomedical engineering, and machine learning.
The development of artificial intelligence (AI) involves the creation of computer systems that can do activities that would ordinarily require human intelligence, such as visual perception, speech recognition, decision making, and language translation. Through increasingly complex programming approaches, it has been transforming and advancing the discipline of computer science. Artificial Intelligence Methods and Applications in Computer Engineering illuminates how today's computer engineers and scientists can use AI in real-world applications. It focuses on a few current and emergent AI applications, allowing a more in-depth discussion of each topic. Covering topics such as biomedical research applications, navigation systems, and search engines, this premier reference source is an excellent resource for computer scientists, computer engineers, IT managers, students and educators of higher education, librarians, researchers, and academicians. |
You may like...
Fuzzy Hierarchical Model for Risk…
Hing Kai Chan, Xiaojun Wang
Hardcover
Computational Transport Phenomena of…
Hamid Arastoopour, Dimitri Gidaspow, …
Hardcover
R3,332
Discovery Miles 33 320
Thirty Years of Learning Environments…
David B. Zandvliet, Barry Fraser
Hardcover
R3,426
Discovery Miles 34 260
|