![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
With the growing use of new technologies and artificial intelligence (AI) applications, intelligent systems can be used to manage large amounts of existing data in healthcare domains. Having more intelligent methods for accessing data allows medical professionals to more efficiently identify the best medical practices and more concrete solutions for diagnosing and treating a multitude of rare diseases. Intelligent Systems for Healthcare Management and Delivery provides relevant and advanced methodological, technological, and scientific approaches related to the application of sophisticated exploitation of AI, as well as providing insight into the technologies and intelligent applications that have received growing attention in recent years such as medical imaging, EMR systems, and drug development assistance. This publication fosters a scientific debate for new healthcare intelligent systems and sophisticated approaches for enhanced healthcare services and is ideally designed for medical professionals, hospital staff, rehabilitation specialists, medical educators, and researchers.
Increasingly, human beings are sensors engaging directly with the mobile Internet. Individuals can now share real-time experiences at an unprecedented scale. Social Sensing: Building Reliable Systems on Unreliable Data looks at recent advances in the emerging field of social sensing, emphasizing the key problem faced by application designers: how to extract reliable information from data collected from largely unknown and possibly unreliable sources. The book explains how a myriad of societal applications can be derived from this massive amount of data collected and shared by average individuals. The title offers theoretical foundations to support emerging data-driven cyber-physical applications and touches on key issues such as privacy. The authors present solutions based on recent research and novel ideas that leverage techniques from cyber-physical systems, sensor networks, machine learning, data mining, and information fusion.
The Smart Grid security ecosystem is complex and multi-disciplinary, and relatively under-researched compared to the traditional information and network security disciplines. While the Smart Grid has provided increased efficiencies in monitoring power usage, directing power supplies to serve peak power needs and improving efficiency of power delivery, the Smart Grid has also opened the way for information security breaches and other types of security breaches. Potential threats range from meter manipulation to directed, high-impact attacks on critical infrastructure that could bring down regional or national power grids. It is essential that security measures are put in place to ensure that the Smart Grid does not succumb to these threats and to safeguard this critical infrastructure at all times. Dr. Florian Skopik is one of the leading researchers in Smart Grid security, having organized and led research consortia and panel discussions in this field. Smart Grid Security will provide the first truly holistic view of leading edge Smart Grid security research. This book does not focus on vendor-specific solutions, instead providing a complete presentation of forward-looking research in all areas of Smart Grid security. The book will enable practitioners to learn about upcoming trends, scientists to share new directions in research, and government and industry decision-makers to prepare for major strategic decisions regarding implementation of Smart Grid technology.
Across numerous industries in modern society, there is a constant need to gather precise and relevant data efficiently and quickly. As such, it is imperative to research new methods and approaches to increase productivity in these areas. Next-Generation Information Retrieval and Knowledge Resources Management is a key source on the latest advancements in multidisciplinary research methods and applications and examines effective techniques for managing and utilizing information resources. Featuring extensive coverage across a range of relevant perspectives and topics, such as knowledge discovery, spatial indexing, and data mining, this book is ideally designed for researchers, graduate students, academics, and industry professionals seeking ways to optimize knowledge management processes.
While doctors and physicians are more than capable of detecting diseases of the brain, the most agile human mind cannot compete with the processing power of modern technology. Utilizing algorithmic systems in healthcare in this way may provide a way to treat neurological diseases before they happen. Early Detection of Neurological Disorders Using Machine Learning Systems provides innovative insights into implementing smart systems to detect neurological diseases at a faster rate than by normal means. The topics included in this book are artificial intelligence, data analysis, and biomedical informatics. It is designed for clinicians, doctors, neurologists, physiotherapists, neurorehabilitation specialists, scholars, academics, and students interested in topics centered on biomedical engineering, bio-electronics, medical electronics, physiology, neurosciences, life sciences, and physics.
Internet usage has become a normal and essential aspect of everyday life. Due to the immense amount of information available on the web, it has become obligatory to find ways to sift through and categorize the overload of data while removing redundant material. Collaborative Filtering Using Data Mining and Analysis evaluates the latest patterns and trending topics in the utilization of data mining tools and filtering practices. Featuring emergent research and optimization techniques in the areas of opinion mining, text mining, and sentiment analysis, as well as their various applications, this book is an essential reference source for researchers and engineers interested in collaborative filtering.
Hidden semi-Markov models (HSMMs) are among the most important models in the area of artificial intelligence / machine learning. Since the first HSMM was introduced in 1980 for machine recognition of speech, three other HSMMs have been proposed, with various definitions of duration and observation distributions. Those models have different expressions, algorithms, computational complexities, and applicable areas, without explicitly interchangeable forms. Hidden Semi-Markov Models: Theory, Algorithms and Applications provides a unified and foundational approach to HSMMs, including various HSMMs (such as the explicit duration, variable transition, and residential time of HSMMs), inference and estimation algorithms, implementation methods and application instances. Learn new developments and state-of-the-art emerging topics as they relate to HSMMs, presented with examples drawn from medicine, engineering and computer science.
In today's digital world, the huge amount of data being generated is unstructured, messy, and chaotic in nature. Dealing with such data, and attempting to unfold the meaningful information, can be a challenging task. Feature engineering is a process to transform such data into a suitable form that better assists with interpretation and visualization. Through this method, the transformed data is more transparent to the machine learning models, which in turn causes better prediction and analysis of results. Data science is crucial for the data scientist to assess the trade-offs of their decisions regarding the effectiveness of the machine learning model implemented. Investigating the demand in this area today and in the future is a necessity. The Handbook of Research on Automated Feature Engineering and Advanced Applications in Data Science provides an in-depth analysis on both the theoretical and the latest empirical research findings on how features can be extracted and transformed from raw data. The chapters will introduce feature engineering and the recent concepts, methods, and applications with the use of various data types, as well as examine the latest machine learning applications on the data. While highlighting topics such as detection, tracking, selection techniques, and prediction models using data science, this book is ideally intended for research scholars, big data scientists, project developers, data analysts, and computer scientists along with practitioners, researchers, academicians, and students interested in feature engineering and its impact on data.
Text analysis tools aid in extracting meaning from digital content. As digital text becomes more and more complex, new techniques are needed to understand conceptual structure. Concept Parsing Algorithms (CPA) for Textual Analysis and Discovery: Emerging Research and Opportunities provides an innovative perspective on the application of algorithmic tools to study unstructured digital content. Highlighting pertinent topics such as semantic tools, semiotic systems, and pattern detection, this book is ideally designed for researchers, academics, students, professionals, and practitioners interested in developing a better understanding of digital text analysis.
The Western cultural trend of self-representation is transcending borders as it permeates the online world. A prime example of this trend is selfies, and how they have evolved into more than just self-portraits. Selfies as a Mode of Social Media and Work Space Research is a comprehensive reference source for the latest research on explicit and implicit messaging of self-portraiture and its indications about individuals, groups, and societies. Featuring coverage on a broad range of topics including dating, job hunting, and marketing, this publication is ideally designed for academicians, researchers, and professionals interested in the current phenomenon of selfies and their impact on society.
Information modeling plays an important role in every level of the enterprise information system's architecture. Modeling allows organizations to adapt and become more efficient, helping top managers and engineers outline tactics to reach strategic objectives, understand organizational needs, and design information systems that are aligned with business goals. New Perspectives on Information Systems Modeling and Design is an essential reference source that discusses organizational adaptation through the integration of new information technologies into existing processes and underlying supporting applications. Featuring research on topics such as application integration, change management, and mobile process activities, this book is ideally designed for managers, researchers, system developers, entrepreneurs, graduate-level students, business professionals, information system engineers, and academicians seeking coverage on emerging technological developments and practical solutions for system modeling and design.
Investments in technologies such as the cloud, the internet of things (IoT), and robotic process automation are part of a strategy that helps organizations respond to changing customer demands and operational challenges. Emerging technologies are becoming one of the most remarkable elements to be considered in businesses, and e-businesses are no exception. With the expansion of e-businesses worldwide, the great population of e-business leaders tends to increase their knowledge to make future investments in key aspects and implications of their businesses. Thus, e-business leaders need to realize and seize existing opportunities for the advancement of their businesses. Driving Transformative Change in E-Business Through Applied Intelligence and Emerging Technologies contributes a comprehensive source to the existing knowledge and research in the field of e-business and emerging technologies and provides an understanding to readers about the current concepts, trends, technologies, and platforms in e-business. Covering topics such as competitive intelligence, enterprise resource planning systems, and online crowdfunding, this premier reference source is a comprehensive resource for business leaders and executives, IT managers, computer scientists, software engineers, economists, entrepreneurs, students, researchers, and academicians.
The Destiny Grimoire Anthology is a must-have collectible lore compendium assembled for Destiny's devoted and enlightened scholars and lore lovers, as well as fans of fantasy and science fiction storytelling. The Destiny Grimoire Anthology weaves tales from multiple sources together for the first time, casting new light on Destiny's most legendary heroes, infamous villains, and their greatest moments of triumph and tragedy.
Bio-inspired computation, especially those based on swarm intelligence, has become increasingly popular in the last decade. Bio-Inspired Computation in Telecommunications reviews the latest developments in bio-inspired computation from both theory and application as they relate to telecommunications and image processing, providing a complete resource that analyzes and discusses the latest and future trends in research directions. Written by recognized experts, this is a must-have guide for researchers, telecommunication engineers, computer scientists and PhD students.
Data is the most important commodity, which is why data protection has become a global priority. Data breaches and security flaws can jeopardize the global economy. Organizations face a greater risk of failing to achieve strategy and business goals as cyber threat behavior grows in frequency, sophistication, and destructiveness. A breach can result in data loss, business interruption, brand and reputation harm, as well as regulatory and legal consequences. A company needs a well-thought-out cybersecurity strategy to secure its critical infrastructure and information systems in order to overcome these challenges. Cross-Industry Applications of Cyber Security Frameworks provides an understanding of the specific, standards-based security controls that make up a best practice cybersecurity program. It is equipped with cross-industry applications of cybersecurity frameworks, best practices for common practices, and suggestions that may be highly relevant or appropriate in every case. Covering topics such as legal frameworks, cybersecurity in FinTech, and open banking, this premier reference source is an essential resource for executives, business leaders, managers, entrepreneurs, IT professionals, government officials, hospital administrators, educational administrators, privacy specialists, researchers, and academicians.
INTELLIGENT SECURITY SYSTEMS Dramatically improve your cybersecurity using AI and machine learning In Intelligent Security Systems, distinguished professor and computer scientist Dr. Leon Reznik delivers an expert synthesis of artificial intelligence, machine learning and data science techniques, applied to computer security to assist readers in hardening their computer systems against threats. Emphasizing practical and actionable strategies that can be immediately implemented by industry professionals and computer device's owners, the author explains how to install and harden firewalls, intrusion detection systems, attack recognition tools, and malware protection systems. He also explains how to recognize and counter common hacking activities. This book bridges the gap between cybersecurity education and new data science programs, discussing how cutting-edge artificial intelligence and machine learning techniques can work for and against cybersecurity efforts. Intelligent Security Systems includes supplementary resources on an author-hosted website, such as classroom presentation slides, sample review, test and exam questions, and practice exercises to make the material contained practical and useful. The book also offers: A thorough introduction to computer security, artificial intelligence, and machine learning, including basic definitions and concepts like threats, vulnerabilities, risks, attacks, protection, and tools An exploration of firewall design and implementation, including firewall types and models, typical designs and configurations, and their limitations and problems Discussions of intrusion detection systems (IDS), including architecture topologies, components, and operational ranges, classification approaches, and machine learning techniques in IDS design A treatment of malware and vulnerabilities detection and protection, including malware classes, history, and development trends Perfect for undergraduate and graduate students in computer security, computer science and engineering, Intelligent Security Systems will also earn a place in the libraries of students and educators in information technology and data science, as well as professionals working in those fields. |
You may like...
Variational Methods in Shape…
Dorin Bucur, Giuseppe Buttazzo
Hardcover
R1,525
Discovery Miles 15 250
Introduction to Nonsmooth Optimization…
Adil Bagirov, Napsu Karmitsa, …
Hardcover
R4,146
Discovery Miles 41 460
Limits of Stability and Stabilization of…
Jing Zhu, Tian Qi, …
Hardcover
R2,681
Discovery Miles 26 810
Solvability, Regularity, and Optimal…
Pierluigi Colli, Angelo Favini, …
Hardcover
R3,437
Discovery Miles 34 370
Fixed-Point Algorithms for Inverse…
Heinz H. Bauschke, Regina S. Burachik, …
Hardcover
R4,072
Discovery Miles 40 720
Variational Analysis and Generalized…
Regina S. Burachik, Jen-Chih Yao
Hardcover
R2,668
Discovery Miles 26 680
Finite-Dimensional Variational…
Francisco Facchinei, Jong-Shi Pang
Hardcover
R2,807
Discovery Miles 28 070
Measurements and their Uncertainties - A…
Ifan Hughes, Thomas Hase
Hardcover
R2,694
Discovery Miles 26 940
Fault Diagnosis Inverse Problems…
Lidice Camps Echevarria, Orestes Llanes Santiago, …
Hardcover
R2,879
Discovery Miles 28 790
|