![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Applications of computing
This book has a focus on the development and deployment of the Industrial Internet of Things (IIoT) paradigm, discussing frameworks, methodologies, benefits and limitations, as well as providing case studies of employing the IoT vision in the industrial domain. IIoT is becoming an attractive business reality for many organisations such as manufacturing, logistics, oil and gas, energy and other utilities, mining, aviation, and many more. The opportunities for this paradigm are huge, and according to one report, the IIoT market is predicted to reach $125 billion by 2021. The driving philosophy behind the IIoT is that smart machines are better than humans at accurately capturing, analysing and communicating real-time data. The underlying technologies include distributed computing, machine learning, artificial intelligence, and machine-to-machine communication, with a typical IIoT system consisting of intelligent systems (applications, controllers, sensors, and security mechanisms), data communication infrastructure (cloud computing, edge computing, etc.), data analytics (to support business intelligence and corporate decision making), and most importantly the human element. The promised benefits of the IIoT include enhanced safety, better reliability, smart metering, inventory management, equipment tracking, and facilities management. There are, however, numerous issues that are also becoming the focus of active research, such as concerns regarding service availability, data security, and device communication. Lack of ubiquitous interoperability between heterogeneous devices is also a major concern. This book intends to fill a gap in the IIoT literature by providing the scientific contributions and latest developments from researchers and practitioners of international repute, focusing on frameworks, methodologies, benefits, and inherent issues/barriers to connected environments, especially in industrial settings. The intended audience includes network specialists, hardware engineers, and security experts who wish to adopt newer approaches for device connectivity, IoT security, and sensor-based devices design. University level students, researchers and practitioners will also find the latest innovation in technology and newer approaches relevant to the IIoT from a distributed computing perspective.
The digital age is ripe with emerging advances and applications in technological innovations. Mimicking the structure of complex systems in nature can provide new ideas on how to organize mechanical and personal systems. The Handbook of Research on Modeling, Analysis, and Application of Nature-Inspired Metaheuristic Algorithms is an essential scholarly resource on current algorithms that have been inspired by the natural world. Featuring coverage on diverse topics such as cellular automata, simulated annealing, genetic programming, and differential evolution, this reference publication is ideal for scientists, biological engineers, academics, students, and researchers that are interested in discovering what models from nature influence the current technology-centric world.
In light of the emerging global information infrastructure, information technology standards are becoming increasingly important. At the same time, however, the standards setting process has been criticized as being slow, inefficient and out of touch with market needs. What can be done to resolve this situation? To provide a basis for an answer to this question, Information Technology Standards and Standardization: A Global Perspective paints as full a picture as possible of the varied and diverse aspects surrounding standards and standardization. This book will serve as a foundation for research, discussion and practice as it addresses trends, problems and solutions for and by numerous disciplines, such as economics, social sciences, management studies, politics, computer science and, particularly, users.
Facial recognition software has improved by leaps and bounds over the past few decades, with error rates decreasing significantly within the past ten years. Though this is true, conditions such as poor lighting, obstructions, and profile-only angles have continued to persist in preventing wholly accurate readings. Face Recognition in Adverse Conditions examines how the field of facial recognition takes these adverse conditions into account when designing more effective applications by discussing facial recognition under real world PIE variations, current applications, and the future of the field of facial recognition research. The work is intended for academics, engineers, and researchers specializing in the field of facial recognition.
Secured Transactions: Problems and Materials combines original material with recent cases to teach students about secured financing under Article 9 of the Uniform Commercial Code. Students learn how to identify basic Article 9 issues and craft solutions for them. The book begins with an explanation of secured versus unsecured financing and addresses how transactions were handled before the institution of Article 9. It then discusses specific aspects of Article 9 including its scope, creating and protecting a security interest, priorities, exceptions, fixtures, proceeds, and enforcement. The book is built around a series of problems that connect the cases and original material to the text of Article 9. The original material clarifies and contextualizes the legal issues, providing background and support. The cases demonstrate how legal principles are applied in the real world, enabling students to understand automatic perfection, certificates of title, statutory liens, commercial reasonableness, and more. The revised first edition features updated information regarding laws and legislation, as well as new cases for the chapters on repossessing fixtures and proceeds. Secured Transactions successfully balances the study of law and its application. It is an ideal book for foundational courses in secured transactions.
Tanja Schultz and Katrin Kirchhoff have compiled a comprehensive
overview of speech processing from a multilingual perspective. By
taking this all-inclusive approach to speech processing, the
editors have included theories, algorithms, and techniques that are
required to support spoken input and output in a large variety of
languages. This book presents a comprehensive introduction to
research problems and solutions, both from a theoretical as well as
a practical perspective, and highlights technology that
incorporates the increasing necessity for multilingual applications
in our global community.
This edited volume explores the intersection between philosophy and computing. It features work presented at the 2016 annual meeting of the International Association for Computing and Philosophy. The 23 contributions to this volume neatly represent a cross section of 40 papers, four keynote addresses, and eight symposia as they cut across six distinct research agendas. The volume begins with foundational studies in computation and information, epistemology and philosophy of science, and logic. The contributions next examine research into computational aspects of cognition and philosophy of mind. This leads to a look at moral dimensions of man-machine interaction as well as issues of trust, privacy, and justice. This multi-disciplinary or, better yet, a-disciplinary investigation reveals the fruitfulness of erasing distinctions among and boundaries between established academic disciplines. This should come as no surprise. The computational turn itself is a-disciplinary and no former discipline, whether scientific, artistic, or humanistic, has remained unchanged. Rigorous reflection on the nature of these changes opens the door to inquiry into the nature of the world, what constitutes our knowledge of it, and our understanding of our place in it. These investigations are only just beginning. The contributions to this volume make this clear: many encourage further research and end with open questions.
This textbook is designed for graduate-level courses, and for self-study, in analog and sampled-data, including switched-capacitor, circuit theory and design for ongoing, or active electrical engineers, needing to become proficient in analog circuit design on a system, rather than on a device, level. After decades of experience in industry and teaching this material in academic settings, the author has extracted many of the most important and useful features of analog circuit theory and design and presented them in a manner that is easy to digest and utilize. The methodology and analysis techniques presented can be applied to areas well beyond those specifically addressed in this book. This book is meant to enable readers to gain a 'general knowledge' of one aspect of analog engineering (e.g., that of network theory, filter design, system theory and sampled-data signal processing). The presentation is self-contained and should be accessible to anyone with a first degree in electrical engineering.
Hybrid learning is now the single-greatest trend in education today due to the numerous educational advantages when both traditional classroom learning and e-learning are implemented collectively. The Handbook of Research on Hybrid Learning Models: Advanced Tools, Technologies, and Applications collects emerging research and pedagogies related to the convergence of teaching and learning methods. This significant Handbook of Research provides researchers, scholars, students, and professionals access to the latest knowledge related to hybrid learning, discovered and written by an international gathering of e-learning experts.
A key technology enabling fast-paced embedded media processing developments is the high-performance, low-power, small-footprint convergent processor, a specialized device that combines the real-time control of a traditional microcontroller with the signal processing power of a DSP. This practical guide is your one-stop shop for understanding how to implement this cutting-edge technology. You will learn how to: * Choose the proper processor for an application. * Architect your system to avoid problems at the outset. * Manage your data flows and memory accesses so that they line up properly * Make smart-trade-offs in portable applications between power considerations and computational performance. * Divide processing tasks across multiple cores. * Program frameworks that optimize performance without needlessly increasing programming model complexity. * Implement benchmarking techniques that will help you adapt a framework to best fit a target application, and much more Covering the entire spectrum of EMP-related design issues, from easy-to-understand explanations of basic architecture and direct memory access (DMA), to in-depth discussions of code optimization and power management, this practical book will be an invaluable aid to every engineer working with EMP, from the beginner to the seasoned expert. All disc-based content for this title is now available on the
Web. * Comprehensive subject coverage with emphasis on practical application * Essential assembly language code included throughout text * Many real-world examples using Analog's popular Blackfin Processor architecture
In today's modernized market, various disciplines continue to search for universally functional technologies that improve upon traditional processes. Artificial neural networks are a set of statistical modeling tools that are capable of processing nonlinear data with strong accuracy. Due to their complexity, utilizing their potential was previously seen as a challenge. However, with the development of artificial intelligence, this technology has proven to be an effective and efficient problem-solving method. Artificial Neural Network Applications in Business and Engineering is an essential reference source that illustrates recent advancements of artificial neural networks in various professional fields, accompanied by specific case studies and practical examples. Featuring research on topics such as training algorithms, transportation, and computer security, this book is ideally designed for researchers, students, developers, managers, engineers, academicians, industrialists, policymakers, and educators seeking coverage on modern trends in artificial neural networks and their real-world implementations.
A practical reference written to assist the security professional
in clearly identifying what systems are required to meet security
needs as defined by a threat analysis and vulnerability assessment.
All of the elements necessary to conduct a detailed survey of a
facility and the methods used to document the findings of that
survey are covered. Once the required systems are determined, the
chapters following present how to assemble and evaluate bids for
the acquisition of the required systems in a manner that will meet
the most rigorous standards established for competitive bidding.
The book also provides recommended approaches for system/user
implementation, giving checklists and examples for developing
management controls using the installed systems. This book was
developed after a careful examination of the approved reference
material available from the American Society for Industrial
Security (ASIS International) for the certification of Physical
Security Professionals (PSP). It is intended to fill voids left by
the currently approved reference material to perform implementation
of systems suggested in the existing reference texts. This book is
an excellent "How To" for the aspiring security professional who
wishes to take on the responsibilities of security system
implementation, or the security manager who wants to do a
professional job of system acquisition without hiring a
professional consultant.
A groundbreaking, flexible approach to computer science anddata science The Deitels' Introduction to Python for ComputerScience and Data Science: Learning to Program with AI, Big Data and the Cloudoffers a unique approach to teaching introductory Python programming,appropriate for both computer-science and data-science audiences. Providing themost current coverage of topics and applications, the book is paired withextensive traditional supplements as well as Jupyter Notebooks supplements.Real-world datasets and artificial-intelligence technologies allow students towork on projects making a difference in business, industry, government andacademia. Hundreds of examples, exercises, projects (EEPs) and implementationcase studies give students an engaging, challenging and entertainingintroduction to Python programming and hands-on data science. The book's modular architecture enables instructors toconveniently adapt the text to a wide range of computer-science anddata-science courses offered to audiences drawn from many majors.Computer-science instructors can integrate as much or as little data-scienceand artificial-intelligence topics as they'd like, and data-science instructorscan integrate as much or as little Python as they'd like. The book aligns withthe latest ACM/IEEE CS-and-related computing curriculum initiatives and withthe Data Science Undergraduate Curriculum Proposal sponsored by the NationalScience Foundation.
The unique research area of audio-visual speech recognition has attracted much interest in recent years as visual information about lip dynamics has been shown to improve the performance of automatic speech recognition systems, especially in noisy environments.""Visual Speech Recognition: Lip Segmentation and Mapping"" presents an up-to-date account of research done in the areas of lip segmentation, visual speech recognition, and speaker identification and verification. A useful reference for researchers working in this field, this book contains the latest research results from renowned experts with in-depth discussion on topics such as visual speaker authentication, lip modeling, and systematic evaluation of lip features.
This publication contributes to the serious games field by investigating original contributions and methods that use serious games in various domains. This comprehensive and timely publication works as an essential reference source, building on the available literature in the field of Serious Games for the economic and social development of countries while providing for further research opportunities in this dynamic and growing field. Thus, the book provides the opportunity for a reflection on this important issue, increasing the understanding of the importance of Serious Games in the context of organizations' improvements, providing relevant academic work, empirical research findings, and an overview of this relevant field of study. This text provides the resources necessary for policy makers, technology developers and managers to adopt and implement solutions for a more digital era.
As the healthcare industry continues to expand, it must utilize technology to ensure efficiencies are maintained. Healthcare needs to move in a direction where computational methods and algorithms can relieve the routine work of medical doctors, leaving them more time to carry out more important and skilled tasks such as surgery. Computational Methods and Algorithms for Medicine and Optimized Clinical Practice discusses some of the most interesting aspects of theoretical and applied research covering complementary facets of computational methods and algorithms to achieve greater efficiency and support medical personnel. Featuring research on topics such as healthcare reform, artificial intelligence, and disease detection, this book will particularly appeal to medical professionals and practitioners, hospitals, administrators, students, researchers, and academicians.
This book bridges the communication gap between neuroscientists and engineers through the unifying theme of correlation-based learning Developing brain-style signal processing or machine learning algorithms has attracted many sharp minds from a range of disciplines. Now, coauthored by four researchers with varying backgrounds in signal processing, neuroscience, psychology, and computer science, Correlative Learning unifies the many cross-fertilized ideas in computational neuroscience and signal processing in a common language that will help engineers understand and appreciate the human brain as a highly sophisticated biosystem for building more intelligent machines. First, the authors present the necessary neuroscience background for engineers, and then go on to relate the common intrinsic structures of the learning mechanisms of the brain to signal processing, machine learning, kernel learning, complex-valued domains, and the ALOPEX learning paradigm. This correlation-based approach to building complex, reliable (robust), and adaptive systems is vital for engineers, researchers, and graduate students from various fields of science and engineering. Figures, tables, worked examples, and case studies illustrate how to use computational tools for either helping to understand brain functions or fitting specific engineering applications, and a comprehensive bibliography covering over 1,000 references from major publications is included for further reading.
Addresses different scenarios when finding complex relationships in spatiotemporal data by modeling them as graphs, giving readers a comprehensive synopsis on two successful partition-based algorithms designed by the authors.
Trying to learn Maya programming from the documentation can be
daunting whether or not you are a programmer. The first edition of
"MEL Scripting for Maya Animators" earned the reputation as the
best introductory book on MEL, Maya's scripting language. Now fully
revised and updated, the second edition also includes new features,
such as a discussion of global procedures, new chapters on fixing
programming bottlenecks, advanced user interface techniques, and
optimizing character rigs. New chapters on utility nodes and Maya's
Web Panel feature provide new ideas on how to use MEL in
applications.
Electronic participation is an emerging and growing research area that makes use of internet solutions to enhance citizens' participation in government processes in order to provide a fair and efficient society. This book examines recommender-system technologies and voting advice applications as tools to enable electronic citizen participation during election campaigns. Further, making use of fuzzy classification, it provides an evaluation framework for eParticipation. A dynamic voting advice application developed for the 2017 Ecuador national election serves as a real-world case study to introduce readers to the practical implementation and evaluation issues. The book concludes with a comprehensive analysis of the 2017 election project based on altmetrics, Google Analytics and statistics from the case study.
The book is logically divided into 5 main categories with each
category representing a major skill set required by most security
professionals: |
You may like...
The Situationist International - A…
Alastair Hemmens, Gabriel Zacarias
Hardcover
R2,500
Discovery Miles 25 000
Building the E-Service Society…
Winfried Lamersdorf, Volker Tschammer, …
Hardcover
R4,096
Discovery Miles 40 960
Impact of Mobile Services on Business…
Francisco Liebana, Zoran Kalinic, …
Hardcover
R5,721
Discovery Miles 57 210
The Invisible Painting - My Memoir of…
Gabriel Weisz Carrington
Paperback
R424
Discovery Miles 4 240
|