![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
The promises and realities of digital innovation have come to suffuse everything from city regions to astronomy, government to finance, art to medicine, politics to warfare, and from genetics to reality itself. Digital systems augmenting physical space, buildings, and communities occupy a special place in the evolutionary discourse about advanced technology. The two Intelligent Environments books edited by Peter Droege span a quarter of a century across this genre. The second volume, Intelligent Environments: Advanced Systems for a Healthy Planet, asks: how does civilization approach thinking systems, intelligent spatial models, design methods, and support structures designed for sustainability, in ways that could counteract challenges to terrestrial habitability? This book examines a range of baseline and benchmark practices but also unusual and even sublime endeavors across regions, currencies, infrastructure, architecture, transactive electricity, geodesign, net-positive planning, remote work, integrated transport, and artificial intelligence in understanding the most immediate spatial setting: the human body. The result of this quest is both highly informative and useful, but also critical. It opens windows on what must fast become a central and overarching existential focus in the face of anthropogenic planetary heating and other threats-and raises concomitant questions about direction, scope, and speed of that change.
Studies on integer optimization in emergency management have attracted engineers and scientists from various disciplines such as management, mathematics, computer science, and other fields. Although there are a large number of literature reports on integer planning and emergency events, few books systematically explain the combination of the two. Researchers need a clear and thorough presentation of the theory and application of integer programming methods for emergency management. Integer Optimization and its Computation in Emergency Management investigates the computation theory of integer optimization, developing integer programming methods for emergency management and explores related practical applications. Pursuing a holistic approach, this book establishes a fundamental framework for this topic, intended for graduate students who are interested in operations research and optimization, researchers investigating emergency management, and algorithm design engineers working on integer programming or other optimization applications.
Cardiovascular and Coronary Artery Imaging, Volume Two presents the basics of echocardiography, nuclear imaging and magnetic resonance imaging (MRI) and provides insights into their appropriate use. The book covers state-of-the-art approaches for automated non-invasive systems for early cardiovascular and coronary artery disease diagnosis. It includes several prominent imaging modalities such as MRI, CT and PET technologies. Other sections focus on major trends and challenges in this area and present the latest techniques for cardiovascular and coronary image analysis.
Customized Production Through 3D Printing in Cloud Manufacturing explains how to combine the latest cloud manufacturing and additive manufacturing technology to find innovative solutions to important problems in research and industry. The manufacturing industry strives constantly to improve levels of product personalization for its customers, who have become increasingly demanding in this respect in recent decades. Among the tools currently growing in use in the industry, there is great potential to address this demand. Cloud manufacturing maps manufacturing resources and capabilities to the cloud, adding the capacity to gather decentralized manufacturing resources and use manufacturing services on-demand, and 3D printing provides strong support for truly individualized manufactured components. This is the first book to cover the whole lifecycle of 3D printing services in a cloud environment, including topics like: cloud servitization of 3D printers, 3D printing model design, supply-demand matching and scheduling, on-demand using and pricing, printing monitoring in cloud, and printing service evaluation. With a systematic introduction to this promising manufacturing paradigm, as well as coverage of models and service management to practical applications, this book will meet the needs of a broad range of researchers as well as practitioners.
The 130th volume is an eclectic volume inspired by recent issues of interest in research and development in computer science and computer engineering. The volume is a collection of five chapters.
A complete and authoritative discussion of systems engineering and neural networks In Systems Engineering Neural Networks, a team of distinguished researchers deliver a thorough exploration of the fundamental concepts underpinning the creation and improvement of neural networks with a systems engineering mindset. In the book, you'll find a general theoretical discussion of both systems engineering and neural networks accompanied by coverage of relevant and specific topics, from deep learning fundamentals to sport business applications. Readers will discover in-depth examples derived from many years of engineering experience, a comprehensive glossary with links to further reading, and supplementary online content. The authors have also included a variety of applications programmed in both Python 3 and Microsoft Excel. The book provides: A thorough introduction to neural networks, introduced as key element of complex systems Practical discussions of systems engineering and forecasting, complexity theory and optimization and how these techniques can be used to support applications outside of the traditional AI domains Comprehensive explorations of input and output, hidden layers, and bias in neural networks, as well as activation functions, cost functions, and back-propagation Guidelines for software development incorporating neural networks with a systems engineering methodology Perfect for students and professionals eager to incorporate machine learning techniques into their products and processes, Systems Engineering Neural Networks will also earn a place in the libraries of managers and researchers working in areas involving neural networks.
Mathematical Methods in Data Science introduces a new approach based on network analysis to integrate big data into the framework of ordinary and partial differential equations for data analysis and prediction. The mathematics is accompanied with examples and problems arising in data science to demonstrate advanced mathematics, in particular, data-driven differential equations used. Chapters also cover network analysis, ordinary and partial differential equations based on recent published and unpublished results. Finally, the book introduces a new approach based on network analysis to integrate big data into the framework of ordinary and partial differential equations for data analysis and prediction. There are a number of books on mathematical methods in data science. Currently, all these related books primarily focus on linear algebra, optimization and statistical methods. However, network analysis, ordinary and partial differential equation models play an increasingly important role in data science. With the availability of unprecedented amount of clinical, epidemiological and social COVID-19 data, data-driven differential equation models have become more useful for infection prediction and analysis.
Data Analysis for Social Microblogging Platforms explores the nature of microblog datasets, also covering the larger field which focuses on information, data and knowledge in the context of natural language processing. The book investigates a range of significant computational techniques which enable data and computer scientists to recognize patterns in these vast datasets, including machine learning, data mining algorithms, rough set and fuzzy set theory, evolutionary computations, combinatorial pattern matching, clustering, summarization and classification. Chapters focus on basic online micro blogging data analysis research methodologies, community detection, summarization application development, performance evaluation and their applications in big data.
Principles of Big Graph: In-depth Insight, Volume 128 in the Advances in Computer series, highlights new advances in the field with this new volume presenting interesting chapters on a variety of topics, including CESDAM: Centered subgraph data matrix for large graph representation, Bivariate, cluster and suitability analysis of NoSQL Solutions for big graph applications, An empirical investigation on Big Graph using deep learning, Analyzing correlation between quality and accuracy of graph clustering, geneBF: Filtering protein-coded gene graph data using bloom filter, Processing large graphs with an alternative representation, MapReduce based convolutional graph neural networks: A comprehensive review. Fast exact triangle counting in large graphs using SIMD acceleration, A comprehensive investigation on attack graphs, Qubit representation of a binary tree and its operations in quantum computation, Modified ML-KNN: Role of similarity measures and nearest neighbor configuration in multi label text classification on big social network graph data, Big graph based online learning through social networks, Community detection in large-scale real-world networks, Power rank: An interactive web page ranking algorithm, GA based energy efficient modelling of a wireless sensor network, The major challenges of big graph and their solutions: A review, and An investigation on socio-cyber crime graph.
AI is the greatest threat to our existence that we have ever faced.
Handbook of Mobility Data Mining: Volume Three: Mobility Data-Driven Applications introduces the fundamental technologies of mobile big data mining (MDM), advanced AI methods, and upper-level applications, helping readers comprehensively understand MDM with a bottom-up approach. The book explains how to preprocess mobile big data, visualize urban mobility, simulate and predict human travel behavior, and assess urban mobility characteristics and their matching performance as conditions and constraints in transport, emergency management, and sustainability development systems. The book contains crucial information for researchers, engineers, operators, administrators, and policymakers seeking greater understanding of current technologies' infra-knowledge structure and limitations. The book introduces how to design MDM platforms that adapt to the evolving mobility environment-and new types of transportation and users-based on an integrated solution that utilizes sensing and communication capabilities to tackle significant challenges faced by the MDM field. This third volume looks at various cases studies to illustrate and explore the methods introduced in the first two volumes, covering topics such as Intelligent Transportation Management, Smart Emergency Management-detailing cases such as the Fukushima earthquake, Hurricane Katrina, and COVID-19-and Urban Sustainability Development, covering bicycle and railway travel behavior, mobility inequality, and road and light pollution inequality.
Zeroing Neural Networks Describes the theoretical and practical aspects of finite-time ZNN methods for solving an array of computational problems Zeroing Neural Networks (ZNN) have become essential tools for solving discretized sensor-driven time-varying matrix problems in engineering, control theory, and on-chip applications for robots. Building on the original ZNN model, finite-time zeroing neural networks (FTZNN) enable efficient, accurate, and predictive real-time computations. Setting up discretized FTZNN algorithms for different time-varying matrix problems requires distinct steps. Zeroing Neural Networks provides in-depth information on the finite-time convergence of ZNN models in solving computational problems. Divided into eight parts, this comprehensive resource covers modeling methods, theoretical analysis, computer simulations, nonlinear activation functions, and more. Each part focuses on a specific type of time-varying computational problem, such as the application of FTZNN to the Lyapunov equation, linear matrix equation, and matrix inversion. Throughout the book, tables explain the performance of different models, while numerous illustrative examples clarify the advantages of each FTZNN method. In addition, the book: Describes how to design, analyze, and apply FTZNN models for solving computational problems Presents multiple FTZNN models for solving time-varying computational problems Details the noise-tolerance of FTZNN models to maximize the adaptability of FTZNN models to complex environments Includes an introduction, problem description, design scheme, theoretical analysis, illustrative verification, application, and summary in every chapter Zeroing Neural Networks: Finite-time Convergence Design, Analysis and Applications is an essential resource for scientists, researchers, academic lecturers, and postgraduates in the field, as well as a valuable reference for engineers and other practitioners working in neurocomputing and intelligent control.
Modeling and Nonlinear Robust Control of Delta-Like Parallel Kinematic Manipulators deals with the modeling and control of parallel robots. The book's content will benefit students, researchers and engineers in robotics by providing a simplified methodology to obtain the dynamic model of parallel robots with a delta-type architecture. Moreover, this methodology is compatible with the real-time implementation of model-based and robust control schemes. And, it can easily extend the proposed robust control solutions to other robotic architectures.
DNA or Deoxyribonucleic Acid computing is an emerging branch of computing that uses DNA sequence, biochemistry, and hardware for encoding genetic information in computers. Here, information is represented by using the four genetic alphabets or DNA bases, namely A (Adenine), G (Guanine), C (Cytosine), and T (Thymine), instead of the binary representation (1 and 0) used by traditional computers. This is achieved because short DNA molecules of any arbitrary sequence of A, G, C, and T can be synthesized to order. DNA computing is mainly popular for three reasons: (i) speed (ii) minimal storage requirements, and (iii) minimal power requirements. There are many applications of DNA computing in the field of computer science. Nowadays, DNA computing is widely used in cryptography for achieving a strong security technique, so that unauthorized users are unable to retrieve the original data content. In DNA-based encryption, data are encrypted by using DNA bases (A, T, G, and C) instead of 0 and 1. As four DNA bases are used in the encryption process, DNA computing supports more randomness and makes it more complex for attackers or malicious users to hack the data. DNA computing is also used for data storage because a large number of data items can be stored inside the condensed volume. One gram of DNA holds approx DNA bases or approx 700 TB. However, it takes approx 233 hard disks to store the same data on 3 TB hard disks, and the weight of all these hard disks can be approx 151 kilos. In a cloud environment, the Data Owner (DO) stores their confidential encrypted data outside of their own domain, which attracts many attackers and hackers. DNA computing can be one of the best solutions to protect the data of a cloud server. Here, the DO can use DNA bases to encrypt the data by generating a long DNA sequence. Another application of DNA computing is in Wireless Sensor Network (WSN). Many researchers are trying to improve the security of WSN by using DNA computing. Here, DNA cryptography is used along with Secure Socket Layer (SSL) that supports a secure medium to exchange information. However, recent research shows some limitations of DNA computing. One of the critical issues is that DNA cryptography does not have a strong mathematical background like other cryptographic systems. This edited book is being planned to bring forth all the information of DNA computing. Along with the research gaps in the currently available books/literature, this edited book presents many applications of DNA computing in the fields of computer science. Moreover, research challenges and future work directions in DNA computing are also provided in this edited book.
Management and Engineering of Critical Infrastructures focuses on two important aspects of CIS, management and engineering. The book provides an ontological foundation for the models and methods needed to design a set of systems, networks and assets that are essential for a society's functioning, and for ensuring the security, safety and economy of a nation. Various examples in agriculture, the water supply, public health, transportation, security services, electricity generation, telecommunication, and financial services can be used to substantiate dangers. Disruptions of CIS can have serious cascading consequences that would stop society from functioning properly and result in loss of life. Malicious software (a.k.a., malware), for example, can disrupt the distribution of electricity across a region, which in turn can lead to the forced shutdown of communication, health and financial sectors. Subsequently, proper engineering and management are important to anticipate possible risks and threats and provide resilient CIS. Although the problem of CIS has been broadly acknowledged and discussed, to date, no unifying theory nor systematic design methods, techniques and tools exist for such CIS.
There is now a plethora of internet of things (IoT) devices on the market that can connect to the internet and the desired environment to produce sufficient and reliable data that is required by the government administration for a variety of purposes. Additionally, the potential benefits of incorporating artificial intelligence (AI) and machine learning into governance are numerous. Governments can use AI and machine learning to enforce the law, detect fraud, and monitor urban areas by identifying problems before they occur. The government can also use AI to easily automate processes and replace mundane and repetitive tasks. AI, IoT, and Blockchain Breakthroughs in E-Governance defines and emphasizes various AI algorithms as well as new internet of things and blockchain breakthroughs in the field of e-governance. Covering key topics such as machine learning, government, and artificial intelligence, this premier reference source is ideal for government officials, policymakers, researchers, academicians, practitioners, scholars, instructors, and students.
Deep neural networks (DNNs) with their dense and complex algorithms provide real possibilities for Artificial General Intelligence (AGI). Meta-learning with DNNs brings AGI much closer: artificial agents solving intelligent tasks that human beings can achieve, even transcending what they can achieve. Meta-Learning: Theory, Algorithms and Applications shows how meta-learning in combination with DNNs advances towards AGI. Meta-Learning: Theory, Algorithms and Applications explains the fundamentals of meta-learning by providing answers to these questions: What is meta-learning?; why do we need meta-learning?; how are self-improved meta-learning mechanisms heading for AGI ?; how can we use meta-learning in our approach to specific scenarios? The book presents the background of seven mainstream paradigms: meta-learning, few-shot learning, deep learning, transfer learning, machine learning, probabilistic modeling, and Bayesian inference. It then explains important state-of-the-art mechanisms and their variants for meta-learning, including memory-augmented neural networks, meta-networks, convolutional Siamese neural networks, matching networks, prototypical networks, relation networks, LSTM meta-learning, model-agnostic meta-learning, and the Reptile algorithm. The book takes a deep dive into nearly 200 state-of-the-art meta-learning algorithms from top tier conferences (e.g. NeurIPS, ICML, CVPR, ACL, ICLR, KDD). It systematically investigates 39 categories of tasks from 11 real-world application fields: Computer Vision, Natural Language Processing, Meta-Reinforcement Learning, Healthcare, Finance and Economy, Construction Materials, Graphic Neural Networks, Program Synthesis, Smart City, Recommended Systems, and Climate Science. Each application field concludes by looking at future trends or by giving a summary of available resources. Meta-Learning: Theory, Algorithms and Applications is a great resource to understand the principles of meta-learning and to learn state-of-the-art meta-learning algorithms, giving the student, researcher and industry professional the ability to apply meta-learning for various novel applications.
Coulomb Interactions in Particle Beams, Volume 223 in the Advances in Imaging and Electron Physics series, merges two long-running serials, Advances in Electronics and Electron Physics and Advances in Optical and Electron Microscopy. The series features articles on the physics of electron devices (especially semiconductor devices), particle optics at high and low energies, microlithography, image science, digital image processing, electromagnetic wave propagation, electron microscopy, and computing methods used in all these domains, with this release exploring Coulomb Interactions in Particle Beams.
Algebraic Theory for True Concurrency presents readers with the algebraic laws for true concurrency. Parallelism and concurrency are two of the core concepts within computer science. This book covers the different realms of concurrency, which enables programs, algorithms or problems to be broken out into order-independent or partially ordered components to improve computation and execution speed. There are two primary approaches for executing concurrency: interleaving concurrency and true concurrency. The main representative of interleaving concurrency is bisimulation/rooted branching bisimulation equivalences which is also readily explored. This work eventually founded the comprehensive axiomatization modulo bisimulation equivalence -- ACP (Algebra of Communicating Processes).The other approach to concurrency is true concurrency. Research on true concurrency is active and includes many emerging applications. First, there are several truly concurrent bisimulation equivalences, including: pomset bisimulation equivalence, step bisimulation equivalence, history-preserving (hp-) bisimulation equivalence, and hereditary history-preserving (hhp-) bisimulation equivalence, the most well-known truly concurrent bisimulation equivalence.
Machine Learning and Pattern Recognition Methods in Chemistry from Multivariate and Data Driven Modeling outlines key knowledge in this area, combining critical introductory approaches with the latest advanced techniques. Beginning with an introduction of univariate and multivariate statistical analysis, the book then explores multivariate calibration and validation methods. Soft modeling in chemical data analysis, hyperspectral data analysis, and autoencoder applications in analytical chemistry are then discussed, providing useful examples of the techniques in chemistry applications. Drawing on the knowledge of a global team of researchers, this book will be a helpful guide for chemists interested in developing their skills in multivariate data and error analysis. |
You may like...
Semantic Web and Peer-to-Peer…
Steffen Staab, Heiner Stuckenschmidt
Hardcover
R2,693
Discovery Miles 26 930
Elementary... the Art and Science of…
Miguel Fernandez, Alan Millington, …
Hardcover
R1,097
Discovery Miles 10 970
Social Web Evolution - Integrating…
Miltiadis D Lytras, Patricia Ordonez De Pablos
Hardcover
R4,935
Discovery Miles 49 350
Crowdsourcing of Sensor Cloud Services
Azadeh Ghari Neiat, Athman Bouguettaya
Hardcover
|