|
Books > Computing & IT
Translation and communication between cultures can sometimes be a
difficult process. Image-based assessments can offer a way for
large populations to be tested on different subjects without having
to create multiple testing programs. Cross-Cultural Analysis of
Image-Based Assessments: Emerging Research and Opportunities is an
innovative resource that offers insight into the application of
visual assessments across a global and intercultural context.
Highlighting applicable topics which include visual literacy,
psychological assessments, assessment development, and equivalency
measurements, this publication is ideal for psychologists,
therapists, and researchers who would like to stay current on the
most efficient way to test multi-cultural populations in various
fields of knowledge.
In today's digital world, the huge amount of data being generated
is unstructured, messy, and chaotic in nature. Dealing with such
data, and attempting to unfold the meaningful information, can be a
challenging task. Feature engineering is a process to transform
such data into a suitable form that better assists with
interpretation and visualization. Through this method, the
transformed data is more transparent to the machine learning
models, which in turn causes better prediction and analysis of
results. Data science is crucial for the data scientist to assess
the trade-offs of their decisions regarding the effectiveness of
the machine learning model implemented. Investigating the demand in
this area today and in the future is a necessity. The Handbook of
Research on Automated Feature Engineering and Advanced Applications
in Data Science provides an in-depth analysis on both the
theoretical and the latest empirical research findings on how
features can be extracted and transformed from raw data. The
chapters will introduce feature engineering and the recent
concepts, methods, and applications with the use of various data
types, as well as examine the latest machine learning applications
on the data. While highlighting topics such as detection, tracking,
selection techniques, and prediction models using data science,
this book is ideally intended for research scholars, big data
scientists, project developers, data analysts, and computer
scientists along with practitioners, researchers, academicians, and
students interested in feature engineering and its impact on data.
The highly dynamic world of information technology service
management stresses the benefits of the quick and correct
implementation of IT services. A disciplined approach relies on a
separate set of assumptions and principles as an agile approach,
both of which have complicated implementation processes as well as
copious benefits. Combining these two approaches to enhance the
effectiveness of each, while difficult, can yield exceptional
dividends. Balancing Agile and Disciplined Engineering and
Management Approaches for IT Services and Software Products is an
essential publication that focuses on clarifying theoretical
foundations of balanced design methods with conceptual frameworks
and empirical cases. Highlighting a broad range of topics including
business trends, IT service, and software development, this book is
ideally designed for software engineers, software developers,
programmers, information technology professionals, researchers,
academicians, and students.
This book explores new methods, architectures, tools, and
algorithms for Artificial Intelligence Hardware Accelerators. The
authors have structured the material to simplify readers’ journey
toward understanding the aspects of designing hardware
accelerators, complex AI algorithms, and their computational
requirements, along with the multifaceted applications. Coverage
focuses broadly on the hardware aspects of training, inference,
mobile devices, and autonomous vehicles (AVs) based AI accelerators
Research in the domains of learning analytics and educational data
mining has prototyped an approach where methodologies from data
science and machine learning are used to gain insights into the
learning process by using large amounts of data. As many training
and academic institutions are maturing in their data-driven
decision making, useful, scalable, and interesting trends are
emerging. Organizations can benefit from sharing information on
those efforts. Applying Data Science and Learning Analytics
Throughout a Learner's Lifespan examines novel and emerging
applications of data science and sister disciplines for gaining
insights from data to inform interventions into learners' journeys
and interactions with academic institutions. Data is collected at
various times and places throughout a learner's lifecycle, and the
learners and the institution should benefit from the insights and
knowledge gained from this data. Covering topics such as learning
analytics dashboards, text network analysis, and employment
recruitment, this book is an indispensable resource for educators,
computer scientists, faculty of higher education, government
officials, educational administration, students of higher
education, pre-service teachers, business professionals,
researchers, and academicians.
One of the single greatest challenges to security professionals in
the 21st century is terrorism. In the last several years, we have
heard a lot about the importance of preparing for terrorist
attacks. This book offers a way to prevent terrorist attacks.
Providing security managers with a clear and simple methodology to
protect their organizations, Antiterrorism and Threat Response uses
an adaptation of the U.S. Department of Defense's antiterrorism
fundamentals and applies it to the private sector to protect
companies, facilities, and infrastructures. The book's
antiterrorism planning strategies enable security professionals to
seize the initiative away from terrorists-setting them off balance
and keeping them off balance-thereby disrupting their planning
cycle and thwarting attack. The book helps security managers to:
Understand the terrorist attack planning cycle Conduct a terrorism
threat vulnerability assessment Develop an observation plan and the
corresponding verification plan Understand how surveillance
detection works Learn how pattern analysis wheels can be used to
find weaknesses in security operations Appreciate the role of
random antiterrorism measures and learn how to develop them
Establish response plans for a wide variety of contingencies
related to terrorist attack Adapt this methodology to maritime
operations against piracy, individual protection, and travel
security in high-risk environments Work with other security
departments, the police, and the public to create infrastructure
protection zones that will enhance the detection of suspicious
events and reduce the likelihood of terrorist attack The book aims
to show that terrorists are not defeated by technology alone, but
instead by collaboration and the timely passage of relevant
information and intelligence. Terrorism is, above all, an act of
communication. The terrorists communicate to us through their acts
and their carefully crafted communiques. Security professionals
need to send the terrorists a clear and simple message in the
language they understand: You will not succeed here.
Taller de macros de hoja de c lculo es una obra producto de la
experiencia laboral adquirida por m?'s de diez a os, experiencia en
programaci n de macros como soluci n a labores y procesos
repetitivos, organizaci n del trabajo, etc. El conocimiento viene
de diversas maneras, solo es cuesti n de abrir la mente a nuevas
posibilidades y formas de trabajar, la inconformidad canalizada de
manera positiva siempre nos orillar a buscar stas nuevas opciones,
el presente trabajo pretende exponer una manera de c mo cubrir su
inconformidad para automatizar la tarea rutinaria a la que est
harto de realizar, y que considera que una macro programada por
usted puede realizar el trabajo de manera automatizada. Es para m
un agrado el compartir mi experiencia con aquellas y aquellos a
quienes la inquietud por cambiar la forma en que realizan su
trabajo es una b squeda constante siempre para la mejora continua.
Sin importar la preparaci n profesional que usted tenga, este libro
est dirigido al p blico en general, la condici n es tener
conocimientos previos sobre el uso de la hoja de c lculo, mi
preparaci n profesional es la contadur a p blica, por lo que no
piense que la programaci n es solo para ingenieros en sistemas,
licenciados en inform tica o ingenieros en desarrollo de software.
Machine Learning is evolving computation and its application like
never before. It is now widely recognized that machine learning is
playing a similar role as electricity played in modernizing the
world. From simple high school science projects to large-scale
radio astronomy, machine learning has revolutionized it all.
However, a few of the applications stand out as transforming the
world and opening up a new era. The book intends to showcase
applications of machine learning that are leading us to the next
generation of computing and living standards. The book portrays the
application of machine learning to cutting-edge technologies that
are playing a prominent role in improving the quality of life and
the progress of civilization. The focus of the book is not just
machine learning, but its application to specific domains that are
resulting in substantial progress of civilization. It is ideal for
scientists and researchers, academic and corporate libraries,
students, lecturers and teachers, and practitioners and
professionals.
The Dark Web is a known hub that hosts myriad illegal activities
behind the veil of anonymity for its users. For years now, law
enforcement has been struggling to track these illicit activities
and put them to an end. However, the depth and anonymity of the
Dark Web has made these efforts difficult, and as cyber criminals
have more advanced technologies available to them, the struggle
appears to only have the potential to worsen. Law enforcement and
government organizations also have emerging technologies on their
side, however. It is essential for these organizations to stay up
to date on these emerging technologies, such as computational
intelligence, in order to put a stop to the illicit activities and
behaviors presented in the Dark Web. Using Computational
Intelligence for the Dark Web and Illicit Behavior Detection
presents the emerging technologies and applications of
computational intelligence for the law enforcement of the Dark Web.
It features analysis into cybercrime data, examples of the
application of computational intelligence in the Dark Web, and
provides future opportunities for growth in this field. Covering
topics such as cyber threat detection, crime prediction, and
keyword extraction, this premier reference source is an essential
resource for government organizations, law enforcement agencies,
non-profit organizations, politicians, computer scientists,
researchers, students, and academicians.
The fourth edition of this best-selling guide to Prolog and
Artificial Intelligence has been updated to include key
developments in the field while retaining its lucid approach to
these topics. New and extended topics include Constraint Logic
Programming, abductive reasoning and partial order planning.
Divided into two parts, the first part of the book introduces the
programming language Prolog, while the second part teaches
Artificial Intelligence using Prolog as a tool for the
implementation of AI techniques. This textbook is meant to teach
Prolog as a practical programming tool and so it concentrates on
the art of using the basic mechanisms of Prolog to solve
interesting problems. The fourth edition has been fully revised and
extended to provide an even greater range of applications, making
it a self-contained guide to Prolog, AI or AI Programming for
students and professional programmers.
The growing presence of social media and computer use has caused
significant changes to community engagement. With the ubiquity of
these technologies, there is increasing engagement in social and
political policies and changes. Online Communities as Agents of
Change and Social Movements is a pivotal reference source for the
latest research on relevant theoretical and practical frameworks
regarding online communities and social media as agents of social
and political change. Featuring extensive coverage on relevant
areas such as computer use, online engagement, and collective
action, this publication is an ideal resource for researchers,
academics, practitioners, and students in the fields of social
psychology, social network analysis, media studies, information
systems, and political science.
|
You may like...
Oracle 12c - SQL
Joan Casteel
Paperback
(1)
R1,406
R1,302
Discovery Miles 13 020
|