|
|
Books > Computing & IT
Technological development is achievable only when a country has the
ability to systematically design and introduce its own new
technologies. In spite of the variety of studies regarding
technology management, there is still a lack of studies concerning
the principle concepts of technology management in the Middle
Eastern/North African (MENA) region's firms. The generally low
level of ICT diffusion in most of the region's countries widens the
gap between MENA countries and the modern world. Private Sector
Innovations and Technological Growth in the MENA Region provides
innovative insights into investments made for the digital
transformation of major cities in the region that have the
potential to become a significant driver for economic development
and job creation. Highlighting topics such as strategic planning,
risk analysis, and customer loyalty, this publication is designed
for policymakers, economists, academicians, researchers, business
professionals, and students interested in the use of ICT
integration for the advancement of the MENA region.
In the digital era, novel applications and techniques in the realm
of computer science are increasing constantly. These innovations
have led to new techniques and developments in the field of
cybernetics. The Handbook of Research on Applied Cybernetics and
Systems Science is an authoritative reference publication for the
latest scholarly information on complex concepts of more adaptive
and self-regulating systems. Featuring exhaustive coverage on a
variety of topics such as infectious disease modeling, clinical
imaging, and computational modeling, this publication is an ideal
source for researchers and students in the field of computer
science seeking emerging trends in computer science and
computational mathematics.
This book is a general introduction to the statistical analysis of
networks, and can serve both as a research monograph and as a
textbook. Numerous fundamental tools and concepts needed for the
analysis of networks are presented, such as network modeling,
community detection, graph-based semi-supervised learning and
sampling in networks. The description of these concepts is
self-contained, with both theoretical justifications and
applications provided for the presented algorithms.Researchers,
including postgraduate students, working in the area of network
science, complex network analysis, or social network analysis, will
find up-to-date statistical methods relevant to their research
tasks. This book can also serve as textbook material for courses
related to thestatistical approach to the analysis of complex
networks.In general, the chapters are fairly independent and
self-supporting, and the book could be used for course composition
"a la carte". Nevertheless, Chapter 2 is needed to a certain degree
for all parts of the book. It is also recommended to read Chapter 4
before reading Chapters 5 and 6, but this is not absolutely
necessary. Reading Chapter 3 can also be helpful before reading
Chapters 5 and 7. As prerequisites for reading this book, a basic
knowledge in probability, linear algebra and elementary notions of
graph theory is advised. Appendices describing required notions
from the above mentioned disciplines have been added to help
readers gain further understanding.
The Dark Web is a known hub that hosts myriad illegal activities
behind the veil of anonymity for its users. For years now, law
enforcement has been struggling to track these illicit activities
and put them to an end. However, the depth and anonymity of the
Dark Web has made these efforts difficult, and as cyber criminals
have more advanced technologies available to them, the struggle
appears to only have the potential to worsen. Law enforcement and
government organizations also have emerging technologies on their
side, however. It is essential for these organizations to stay up
to date on these emerging technologies, such as computational
intelligence, in order to put a stop to the illicit activities and
behaviors presented in the Dark Web. Using Computational
Intelligence for the Dark Web and Illicit Behavior Detection
presents the emerging technologies and applications of
computational intelligence for the law enforcement of the Dark Web.
It features analysis into cybercrime data, examples of the
application of computational intelligence in the Dark Web, and
provides future opportunities for growth in this field. Covering
topics such as cyber threat detection, crime prediction, and
keyword extraction, this premier reference source is an essential
resource for government organizations, law enforcement agencies,
non-profit organizations, politicians, computer scientists,
researchers, students, and academicians.
The role of data fusion has been expanding in recent years through
the incorporation of pervasive applications, where the physical
infrastructure is coupled with information and communication
technologies, such as wireless sensor networks for the internet of
things (IoT), e-health and Industry 4.0. In this edited reference,
the authors provide advanced tools for the design, analysis and
implementation of inference algorithms in wireless sensor networks.
The book is directed at the sensing, signal processing, and ICTs
research communities. The contents will be of particular use to
researchers (from academia and industry) and practitioners working
in wireless sensor networks, IoT, E-health and Industry 4.0
applications who wish to understand the basics of inference
problems. It will also be of interest to professionals, and
graduate and PhD students who wish to understand the fundamental
concepts of inference algorithms based on intelligent and
energy-efficient protocols.
 |
Pharmako-AI
(Paperback)
K Allado-McDowell
|
R395
R356
Discovery Miles 3 560
Save R39 (10%)
|
Ships in 9 - 17 working days
|
|
|
Recent advancements in technology have allowed for significant
improvements to computer software design and development. By
utilizing the latest available frameworks, developers can build
more innovative applications. Developing Service-Oriented
Applications using the Windows Communication Foundation (WCF)
Framework is a pivotal source of research on the latest protocols
and concepts for applying the Windows Communication Foundation
(WCF) framework in the development of computer software
applications. Highlighting pivotal perspectives on topics such as
interoperability, programming methodologies, and security
considerations, this book is ideally designed for professionals,
researchers, graduate students, software developers, and
practitioners interested in the optimization of service-oriented
architectures.
The lead singer on Supercell's eponymous first album is Hatsune
Miku-a Vocaloid character created by Crypton Future Media with
voice synthesizers. A virtual superstar, over 100,000 songs,
uploaded mostly by fans, are attributed to her. Supercell is a
Japanese creator music group with the composer Ryo leading ten
artists, who design album illustrations and make music videos.
These videos are uploaded onto Niconico and other video-sharing
sites. By the time Supercell was released in March 2009, the
group's Vocaloid works were already well-known to Niconico users
and fans. This book explores the Vocaloid and DTM (desktop music)
phenomena through the lenses of media and fan studies, looking
closely at online social media platforms, the new technology for
composing, avid fans of the Vocaloid character, and these fans'
performative practices. It provides a sense of how interactive new
media and an empowered fan base combine to engage in the creation
processes and enhance the circulation of DTM works. 33 1/3 Global,
a series related to but independent from 33 1/3, takes the format
of the original series of short, music-basedbooks and brings the
focus to music throughout the world. With initial volumes focusing
on Japanese and Brazilian music, the series will also include
volumes on the popular music of Australia/Oceania, Europe, Africa,
the Middle East, and more.
|
You may like...
Oracle 12c - SQL
Joan Casteel
Paperback
(1)
R1,321
R1,228
Discovery Miles 12 280
|