![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer communications & networking
A complete and authoritative discussion of systems engineering and neural networks In Systems Engineering Neural Networks, a team of distinguished researchers deliver a thorough exploration of the fundamental concepts underpinning the creation and improvement of neural networks with a systems engineering mindset. In the book, you'll find a general theoretical discussion of both systems engineering and neural networks accompanied by coverage of relevant and specific topics, from deep learning fundamentals to sport business applications. Readers will discover in-depth examples derived from many years of engineering experience, a comprehensive glossary with links to further reading, and supplementary online content. The authors have also included a variety of applications programmed in both Python 3 and Microsoft Excel. The book provides: A thorough introduction to neural networks, introduced as key element of complex systems Practical discussions of systems engineering and forecasting, complexity theory and optimization and how these techniques can be used to support applications outside of the traditional AI domains Comprehensive explorations of input and output, hidden layers, and bias in neural networks, as well as activation functions, cost functions, and back-propagation Guidelines for software development incorporating neural networks with a systems engineering methodology Perfect for students and professionals eager to incorporate machine learning techniques into their products and processes, Systems Engineering Neural Networks will also earn a place in the libraries of managers and researchers working in areas involving neural networks.
Since the advent of the internet, online communities have emerged as a way for users to share their common interests and connect with others with ease. As the possibilities of the online world grew and the COVID-19 pandemic raged across the world, many organizations recognized the utility in not only providing further services online, but also in transitioning operations typically fulfilled in-person to an online space. As society approaches a reality in which most community practices have moved to online spaces, it is essential that community leaders remain knowledgeable on the best practices in cultivating engagement. Community Engagement in the Online Space evaluates key issues and practices pertaining to community engagement in remote settings. It analyzes various community engagement efforts within remote education, online groups, and remote work. This book further reviews the best practices for community engagement and considerations for the optimization of these practices for effective virtual delivery to support emergency environmental challenges, such as pandemic conditions. Covering topics such as community belonging, global health virtual practicum, and social media engagement, this premier reference source is an excellent resource for program directors, faculty and administrators of both K-12 and higher education, students of higher education, business leaders and executives, IT professionals, online community moderators, librarians, researchers, and academicians.
With the growing maturity and stability of digitization and edge technologies, vast numbers of digital entities, connected devices, and microservices interact purposefully to create huge sets of poly-structured digital data. Corporations are continuously seeking fresh ways to use their data to drive business innovations and disruptions to bring in real digital transformation. Data science (DS) is proving to be the one-stop solution for simplifying the process of knowledge discovery and dissemination out of massive amounts of multi-structured data. Supported by query languages, databases, algorithms, platforms, analytics methods and machine and deep learning (ML and DL) algorithms, graphs are now emerging as a new data structure for optimally representing a variety of data and their intimate relationships. Compared to traditional analytics methods, the connectedness of data points in graph analytics facilitates the identification of clusters of related data points based on levels of influence, association, interaction frequency and probability. Graph analytics is being empowered through a host of path-breaking analytics techniques to explore and pinpoint beneficial relationships between different entities such as organizations, people and transactions. This edited book aims to explain the various aspects and importance of graph data science. The authors from both academia and industry cover algorithms, analytics methods, platforms and databases that are intrinsically capable of creating business value by intelligently leveraging connected data. This book will be a valuable reference for ICTs industry and academic researchers, scientists and engineers, and lecturers and advanced students in the fields of data analytics, data science, cloud/fog/edge architecture, internet of things, artificial intelligence/machine and deep learning, and related fields of applications. It will also be of interest to analytics professionals in industry and IT operations teams.
Developing nations have seen many technological advances in the last decade. Although beneficial and progressive, they can lead to unsafe mobile devices, system networks, and internet of things (IoT) devices, causing security vulnerabilities that can have ripple effects throughout society. While researchers attempt to find solutions, improper implementation and negative uses of technology continue to create new security threats to users. Cybersecurity Capabilities in Developing Nations and Its Impact on Global Security brings together research-based chapters and case studies on systems security techniques and current methods to identify and overcome technological vulnerabilities, emphasizing security issues in developing nations. Focusing on topics such as data privacy and security issues, this book is an essential reference source for researchers, university academics, computing professionals, and upper-level students in developing countries interested in the techniques, laws, and training initiatives currently being implemented and adapted for secure computing.
The modern business world faces many new challenges in preserving its confidentiality and data from online attackers. Further, it also faces a struggle with preventing fraud. These challenges threaten businesses internally and externally and can cause huge losses. It is essential for business leaders to be up to date on the current fraud prevention, confidentiality, and data security to protect their businesses. Fraud Prevention, Confidentiality, and Data Security for Modern Businesses provides examples and research on the security challenges, practices, and blueprints for today's data storage and analysis systems to protect against current and emerging attackers in the modern business world. It includes the organizational, strategic, and technological depth to design modern data security practices within any organization. Covering topics such as confidential communication, information security management, and social engineering, this premier reference source is an indispensable resource for business executives and leaders, entrepreneurs, IT managers, security specialists, students and educators of higher education, librarians, researchers, and academicians.
BLOCKCHAIN TECHNOLOGY IN CORPORATE GOVERANCE This book investigates the recent applications of blockchain technology in financial services, energy sector, and summarizes regulatory responses, to set the scene for future work on corporate governance. This edited book highlights the current governance framework for the blockchain and its development as a self-governing framework. It discusses blockchain technology's effectiveness in developing solutions for supply chains, trade finance, and banking. Moreover, it shows how banking and financial institutions are the major beneficiaries of this decentralized technology. Furthermore, the book outlines the link between company governance theories, regulatory, ethical, and social controls, and blockchain adoption. It also investigates the recent applications of blockchain technology in financial services, the health sector, and the energy sector. Audience The book is specially designed for researchers, industrialists, engineers, graduate students, and policymakers, who aspire to learn, discuss, and carry out further research into the opportunities offered by blockchain and the possible ways of regulating it.
Network Science Network Science offers comprehensive insight on network analysis and network optimization algorithms, with simple step-by-step guides and examples throughout, and a thorough introduction and history of network science, explaining the key concepts and the type of data needed for network analysis, ensuring a smooth learning experience for readers. It also includes a detailed introduction to multiple network optimization algorithms, including linear assignment, network flow and routing problems. The text is comprised of five chapters, focusing on subgraphs, network analysis, network optimization, and includes a list of case studies, those of which include influence factors in telecommunications, fraud detection in taxpayers, identifying the viral effect in purchasing, finding optimal routes considering public transportation systems, among many others. This insightful book shows how to apply algorithms to solve complex problems in real-life scenarios and shows the math behind these algorithms, enabling readers to learn how to develop them and scrutinize the results. Written by a highly qualified author with significant experience in the field, Network Science also includes information on: Sub-networks, covering connected components, bi-connected components, community detection, k-core decomposition, reach network, projection, nodes similarity and pattern matching Network centrality measures, covering degree, influence, clustering coefficient, closeness, betweenness, eigenvector, PageRank, hub and authority Network optimization, covering clique, cycle, linear assignment, minimum-cost network flow, maximum network flow problem, minimum cut, minimum spanning tree, path, shortest path, transitive closure, traveling salesman problem, vehicle routing problem and topological sort With in-depth and authoritative coverage of the subject and many case studies to convey concepts clearly, Network Science is a helpful training resource for professional and industry workers in, telecommunications, insurance, retail, banking, healthcare, public sector, among others, plus as a supplementary reading for an introductory Network Science course for undergraduate students.
Digital transformation in organizations optimizes the business processes but also brings additional challenges in the form of security threats and vulnerabilities. Cyberattacks incur financial losses for organizations and can affect their reputations. Due to this, cybersecurity has become critical for business enterprises. Extensive technological adoption in businesses and the evolution of FinTech applications require reasonable cybersecurity measures to protect organizations from internal and external security threats. Recent advances in the cybersecurity domain such as zero trust architecture, application of machine learning, and quantum and post-quantum cryptography have colossal potential to secure technological infrastructures. Cybersecurity Issues and Challenges for Business and FinTech Applications discusses theoretical foundations and empirical studies of cybersecurity implications in global digital transformation and considers cybersecurity challenges in diverse business areas. Covering essential topics such as artificial intelligence, social commerce, and data leakage, this reference work is ideal for cybersecurity professionals, business owners, managers, policymakers, researchers, scholars, academicians, practitioners, instructors, and students.
Cyber security is a key focus in the modern world as more private information is stored and saved online. In order to ensure vital information is protected from various cyber threats, it is essential to develop a thorough understanding of technologies that can address cyber security challenges. Artificial intelligence has been recognized as an important technology that can be employed successfully in the cyber security sector. Due to this, further study on the potential uses of artificial intelligence is required. The Handbook of Research on Cyber Security Intelligence and Analytics discusses critical artificial intelligence technologies that are utilized in cyber security and considers various cyber security issues and their optimal solutions supported by artificial intelligence. Covering a range of topics such as malware, smart grid, data breachers, and machine learning, this major reference work is ideal for security analysts, cyber security specialists, data analysts, security professionals, computer scientists, government officials, researchers, scholars, academicians, practitioners, instructors, and students.
Recent years have seen a proliferation of cybersecurity guidance in the form of government regulations and standards with which organizations must comply. As society becomes more heavily dependent on cyberspace, increasing levels of security measures will need to be established and maintained to protect the confidentiality, integrity, and availability of information; the privacy of consumers; and the continuity of economic activity. Compliance is a measure of the extent to which a current state is in conformance with a desired state. The desired state is commonly operationalized through specific business objectives, professional standards, and regulations. Assurance services provide a means of evaluating the level of compliance with various cybersecurity requirements. The proposed book will summarize current cybersecurity guidance and provide a compendium of innovative and state-of-the-art compliance and assurance practices and tools that can function both as a reference and pedagogical source for practitioners and educators. This publication will provide a synopsis of current cybersecurity guidance that organizations should consider in establishing and updating their cybersecurity systems. Assurance services will also be addressed so that management and their auditors can regularly evaluate their extent of compliance. This book should be published because its theme will provide company management, practitioners, and academics with a good summary of current guidance and how to conduct assurance of appropriate compliance.
The concept of autonomic computing seeks to reduce the complexity of pervasively ubiquitous system management and maintenance by shifting the responsibility for low-level tasks from humans to the system while allowing humans to concentrate on high-level tasks. This is achieved by building self-managing systems that are generally capable of self-configuring, self-healing, self-optimising, and self-protecting. Trustworthy autonomic computing technologies are being applied in datacentre and cloud management, smart cities and autonomous systems including driverless cars. However, there are still significant challenges to achieving trustworthiness. This book covers challenges and solutions in autonomic computing trustworthiness from methods and techniques to achieve consistent and reliable system self-management. Researchers, developers and users need to be confident that an autonomic self-managing system will remain correct in the face of any possible contexts and environmental inputs. The book is aimed at researchers in autonomic computing, autonomics and trustworthy autonomics. This will be a go-to book for foundational knowledge, proof of concepts and novel trustworthy autonomic techniques and approaches. It will be useful to lecturers and students of autonomic computing, autonomics and multi-agent systems who need an easy-to-use text with sample codes, exercises, use-case demonstrations. This is also an ideal tutorial guide for independent study with simple and well documented diagrams to explain techniques and processes.
Cybersecurity is vital for all businesses, regardless of sector. With constant threats and potential online dangers, businesses must remain aware of the current research and information available to them in order to protect themselves and their employees. Maintaining tight cybersecurity can be difficult for businesses as there are so many moving parts to contend with, but remaining vigilant and having protective measures and training in place is essential for a successful company. The Research Anthology on Business Aspects of Cybersecurity considers all emerging aspects of cybersecurity in the business sector including frameworks, models, best practices, and emerging areas of interest. This comprehensive reference source is split into three sections with the first discussing audits and risk assessments that businesses can conduct to ensure the security of their systems. The second section covers training and awareness initiatives for staff that promotes a security culture. The final section discusses software and systems that can be used to secure and manage cybersecurity threats. Covering topics such as audit models, security behavior, and insider threats, it is ideal for businesses, business professionals, managers, security analysts, IT specialists, executives, academicians, researchers, computer engineers, graduate students, and practitioners.
Smart homes use Internet-connected devices, artificial intelligence, protocols and numerous technologies to enable people to remotely monitor their home, as well as manage various systems within it via the Internet using a smartphone or a computer. A smart home is programmed to act autonomously to improve comfort levels, save energy and potentially ensure safety; the result is a better way of life. Innovative solutions continue to be developed by researchers and engineers and thus smart home technologies are constantly evolving. By the same token, cybercrime is also becoming more prevalent. Indeed, a smart home system is made up of connected devices that cybercriminals can infiltrate to access private information, commit cyber vandalism or infect devices using botnets. This book addresses cyber attacks such as sniffing, port scanning, address spoofing, session hijacking, ransomware and denial of service. It presents, analyzes and discusses the various aspects of cybersecurity as well as solutions proposed by the research community to counter the risks. Cybersecurity in Smart Homes is intended for people who wish to understand the architectures, protocols and different technologies used in smart homes.
Opinion Mining and Text Analytics on Literary Works and Social Media introduces the use of artificial intelligence and big data analytics techniques which can apply opinion mining and text analytics on literary works and social media. This book focuses on theories, method and approaches in which data analytic techniques can be used to analyze data from social media, literary books, novels, news, texts, and beyond to provide a meaningful pattern. The subject area of this book is multidisciplinary; related to data science, artificial intelligence, social science and humanities, and literature. This is an essential resource for scholars, Students and lecturers from various fields of data science, artificial intelligence, social science and humanities, and literature, university libraries, new agencies, and many more.
|
You may like...
VLSI for Artificial Intelligence and…
Jose G.Delgado- Frias, Will Moore
Hardcover
R2,471
Discovery Miles 24 710
Mining Very Large Databases with…
Alex A. Freitas, Simon H. Lavington
Hardcover
R5,260
Discovery Miles 52 600
Green IT Engineering: Social, Business…
Vyacheslav Kharchenko, Yuriy Kondratenko, …
Hardcover
R4,127
Discovery Miles 41 270
Intelligent Techniques and Tools for…
Panagiotis Chountas, Ilias Petrounias
Hardcover
R5,242
Discovery Miles 52 420
Immunology: The Making of a Modern…
Richard B. Gallagher, Jean Gilder, …
Hardcover
R1,199
Discovery Miles 11 990
Evolutionary Concepts in Immunology
Robert Jack, Louis Du Pasquier
Hardcover
R2,420
Discovery Miles 24 200
Novel Therapeutic Agents for the…
Vibeke Strand, David L. Scot, …
Hardcover
R7,616
Discovery Miles 76 160
Metchnikoff and the Origins of…
Alfred I. Tauber, Leon Chernyak
Hardcover
R5,936
Discovery Miles 59 360
|