![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer software packages
This book features research contributions from The Abel Symposium on Statistical Analysis for High Dimensional Data, held in Nyvagar, Lofoten, Norway, in May 2014. The focus of the symposium was on statistical and machine learning methodologies specifically developed for inference in "big data" situations, with particular reference to genomic applications. The contributors, who are among the most prominent researchers on the theory of statistics for high dimensional inference, present new theories and methods, as well as challenging applications and computational solutions. Specific themes include, among others, variable selection and screening, penalised regression, sparsity, thresholding, low dimensional structures, computational challenges, non-convex situations, learning graphical models, sparse covariance and precision matrices, semi- and non-parametric formulations, multiple testing, classification, factor models, clustering, and preselection. Highlighting cutting-edge research and casting light on future research directions, the contributions will benefit graduate students and researchers in computational biology, statistics and the machine learning community.
The book introduces the concept of cloud manufacturing and describes the cloud service technology system behind it. The authors discuss key technologies of manufacturing cloud service management, including service construction, evaluation and composition, and scheduling. With abundant case studies, the book is an essential reference for researchers and engineers in manufacturing and information management.
This book presents a comprehensive study of multivariate time series with linear state space structure. The emphasis is put on both the clarity of the theoretical concepts and on efficient algorithms for implementing the theory. In particular, it investigates the relationship between VARMA and state space models, including canonical forms. It also highlights the relationship between Wiener-Kolmogorov and Kalman filtering both with an infinite and a finite sample. The strength of the book also lies in the numerous algorithms included for state space models that take advantage of the recursive nature of the models. Many of these algorithms can be made robust, fast, reliable and efficient. The book is accompanied by a MATLAB package called SSMMATLAB and a webpage presenting implemented algorithms with many examples and case studies. Though it lays a solid theoretical foundation, the book also focuses on practical application, and includes exercises in each chapter. It is intended for researchers and students working with linear state space models, and who are familiar with linear algebra and possess some knowledge of statistics.
The series, Contemporary Perspectives on Data Mining, is composed of blind refereed scholarly research methods and applications of data mining. This series will be targeted both at the academic community, as well as the business practitioner. Data mining seeks to discover knowledge from vast amounts of data with the use of statistical and mathematical techniques. The knowledge is extracted form this data by examining the patterns of the data, whether they be associations of groups or things, predictions, sequential relationships between time order events or natural groups. Data mining applications are seen in finance (banking, brokerage, insurance), marketing (customer relationships, retailing, logistics, travel), as well as in manufacturing, health care, fraud detection, home-land security, and law enforcement.
This book provides a deep analysis and wide coverage of the very strong trend in computer vision and visual indexing and retrieval, covering such topics as incorporation of models of Human Visual attention into analysis and retrieval tasks. It makes the bridge between psycho-visual modelling of Human Visual System and the classical and most recent models in visual content indexing and retrieval. The large spectrum of visual tasks, such as recognition of textures in static images, of actions in video content, image retrieval, different methods of visualization of images and multimedia content based on visual saliency are presented by the authors. Furthermore, the interest in visual content is modelled with the means of the latest classification models such as Deep Neural Networks is also covered in this book. This book is an exceptional resource as a secondary text for researchers and advanced level students, who are involved in the very wide research in computer vision, visual information indexing and retrieval. Professionals working in this field will also be interested in this book as a reference.
This handbook serves as a comprehensive, systematic reference to the major mathematical models used in radio engineering and communications, and presents computer simulation algorithms to help the reader estimate parameters of radio systems. It provides the technical details necessary to design and analyze radar, communication, radio navigation, radio control, electronic intelligence and electronic warfare systems. Mathcad routines, cited in the handbook, should help the reader to optimize radar system performance analysis, and can be used to create custom-made software that better answers specific needs.
A state-of-the-art guide for the implementation of distributed simulation technology.
New technologies and concepts are constantly being developed within multimedia distribution. In such an ever-evolving environment, academidans, researchers, and professionals of this discipline need access to the most current information about the concepts, issues, trends, and technologies in this emerging field. ""The Handbook of Research on Secure Multimedia Distribution"" provides the latest research on secure multimedia content distribution, embracing a wide variety of aspects and providing a scientifically and scholarly sound treatment of state-of-the-art techniques to students, researchers, and academicians interested or involved in the study, research, use, design, and development of techniques related to multimedia distribution. This title offers: 27 authoritative contributions by over 55 of the world's leading experts on secure multimedia distribution from 17 countries; comprehensive coverage of each specific topic, highlighting recent trends and describing the latest advances in the field; more than 960 references to existing literature and research on secure multimedia distribution; a compendium of over 225 key terms with detailed definitions. This title is organized by topic and indexed, making it a convenient method of reference for all IT/IS scholars and professionals. It features cross-referencing of key terms, figures, and information pertinent to secure multimedia distribution and free institution-wide access to the online version with the purchase of the print publication.
This book presents selected papers from the 3rd International Workshop on Computational Engineering held in Stuttgart from October 6 to 10, 2014, bringing together innovative contributions from related fields with computer science and mathematics as an important technical basis among others. The workshop discussed the state of the art and the further evolution of numerical techniques for simulation in engineering and science. We focus on current trends in numerical simulation in science and engineering, new requirements arising from rapidly increasing parallelism in computer architectures, and novel mathematical approaches. Accordingly, the chapters of the book particularly focus on parallel algorithms and performance optimization, coupled systems, and complex applications and optimization.
Master the art of building in Minecraft Minecraft is a sandbox game where anything is possible! With over 600 blocks to choose from, getting started can feel overwhelming. This Creative Handbook will give you all the tools you need to become an expert builder. Whether it's choosing your blocks or decorating your build, this book is packed with expert advice, top tips and advanced tricks to take your construction skills to the next level. Read how to plan builds, create colour palettes, use effective lighting and much more. This book also features advice from pro build teams and YouTubers, and includes step-by-step builds to complete in-game. With so much to explore, there's sure to be something for 'crafters of every level.
Understanding Software Failure Risk: Introduction. Risk Analysis and Management. Software Failure Risk. Software Failure Risk Measurement: A Methodology for Software Failure Risk Measurement. Applying the Methodology to a Commercial Loan System. Applying the Methodology to a Funds Transfer Security System. Applying the Methodology to a Payables Processing System. Software Failure Risk Management: Software Requirements and Design. Software Testing. Software Maintenance. Software Purchase. Index.
An increasing amount of research is being developed in the area where technology and humans meet. The success or failure of technologies and the question whether technology helps humans to fulfill their goals or whether it hinders them is in most cases not a technical one.User Perception and Influencing Factors of Technology in Everyday Life addresses issues of human and technology interaction. The research in this work is interdisciplinary, ranging from more technical subjects such as computer science, engineering, and information systems, to non-technical descriptions of technology and human interaction from the point of view of sociology or philosophy. This book is perfect for academics, researchers, and professionals alike as it presents a set of theories that allow us to understand the interaction of technology and humans and to put it to practical use.
Here's the first focused discussion of issues and technology in developing networked multimedia systems. This book includes a unique explanation of color specification and its role in achieving high picture quality, high compression ratio and high information retrieval performance, plus valuable coverage of principles and techniques of multimedia information indexing and retrieval critical for future systems.
This book discusses action-oriented, concise and easy-to-communicate goals and challenges related to quality, reliability, infocomm technology and business operations. It brings together groundbreaking research in the area of software reliability, e-maintenance and big data analytics, highlighting the importance of maintaining the current growth in information technology (IT) adoption in businesses, while at the same time proposing process innovations to ensure sustainable development in the immediate future. In its thirty-seven chapters, it covers various areas of e-maintenance solutions, software architectures, patching problems in software reliability, preventive maintenance, industrial big data and reliability applications in electric power systems. The book reviews the ways in which countries currently attempt to resolve the conflicts and opportunities related to quality, reliability, IT and business operations, and proposes that internationally coordinated research plans are essential for effective and sustainable development, with research being most effective when it uses evidence-based decision-making frameworks resulting in clear management objectives, and is organized within adaptive management frameworks. Written by leading experts, the book is of interest to researchers, academicians, practitioners and policy makers alike who are working towards the common goal of making business operations more effective and sustainable.
Machine Learning Techniques for Adaptive Multimedia Retrieval: Technologies Applications and Perspectives disseminates current information on multimedia retrieval, advances the field of multimedia databases, and educates the multimedia database community. It is a critical text for professionals who are engaged in efforts to understand machine learning techniques for adaptive multimedia retrieval research, design and applications.
Amid the restless evil of Sanctuary, only the Horadrim-an ancient order of heroes and scholars-wield the knowledge needed to light the way for humanity. In the Book of Lorath, join Lorath Nahr, one of the last of the dwindling Horadrim, on a journey through Sanctuary's most powerful relics and the stories behind them. It is Lorath's hope that this volume will preserve his knowledge for all time . . . and pass it down to those who will inherit the fight against the Prime Evils. Direct from the Diablo (R) development team and award-winning author Matthew J. Kirby, this immersive, must-have compendium with all-new illustrations showcases the artifacts that have often been-and might yet be-the key to tipping the fate of the world.
This book captures the current challenges in automatic recognition of emotion in spontaneous speech and makes an effort to explain, elaborate, and propose possible solutions. Intelligent human-computer interaction (iHCI) systems thrive on several technologies like automatic speech recognition (ASR); speaker identification; language identification; image and video recognition; affect/mood/emotion analysis; and recognition, to name a few. Given the importance of spontaneity in any human-machine conversational speech, reliable recognition of emotion from naturally spoken spontaneous speech is crucial. While emotions, when explicitly demonstrated by an actor, are easy for a machine to recognize, the same is not true in the case of day-to-day, naturally spoken spontaneous speech. The book explores several reasons behind this, but one of the main reasons for this is that people, especially non-actors, do not explicitly demonstrate their emotion when they speak, thus making it difficult for machines to distinguish one emotion from another that is embedded in their spoken speech. This short book, based on some of authors' previously published books, in the area of audio emotion analysis, identifies the practical challenges in analysing emotions in spontaneous speech and puts forward several possible solutions that can assist in robustly determining the emotions expressed in spontaneous speech.
This book proposes new algorithms to ensure secured communications and prevent unauthorized data exchange in secured multimedia systems. Focusing on numerous applications' algorithms and scenarios, it offers an in-depth analysis of data hiding technologies including watermarking, cryptography, encryption, copy control, and authentication. The authors present a framework for visual data hiding technologies that resolves emerging problems of modern multimedia applications in several contexts including the medical, healthcare, education, and wireless communication networking domains. Further, it introduces several intelligent security techniques with real-time implementation. As part of its comprehensive coverage, the book discusses contemporary multimedia authentication and fingerprinting techniques, while also proposing personal authentication/recognition systems based on hand images, surveillance system security using gait recognition, face recognition under restricted constraints such as dry/wet face conditions, and three-dimensional face identification using the approach developed here. This book equips perception technology professionals with the latest technologies, techniques, and strategies for multimedia security systems, offering a valuable resource for engineers and researchers working to develop security systems.
|
You may like...
14th International Symposium on Process…
Yoshiyuki Yamashita, Manabu Kano
Hardcover
R11,098
Discovery Miles 110 980
Database Systems - Design…
Carlos Coronel, Steven Morris
Paperback
Financial Analysis With Microsoft Excel
Timothy Mayes
Paperback
|