![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
Security and Privacy Issues in Internet of Medical Things addresses the security challenges faced by healthcare providers and patients. As IoMT devices are vulnerable to cyberattacks, and a security breach through IoMT devices may act as a pathway for hackers to enter hospital networks, the book covers a very timely topic. The incorporation of blockchain in the healthcare environment has given birth to the Internet of Medical Things (IoMT), which consists of a collection of healthcare systems that espouse groundbreaking technologies. Systems consist of inter-linked sensors, wearable technology devices and clinical frameworks that perform explicit, secure machine-to-machine and cloud platform communications. The significance of IoMT in the field of healthcare is undoubtedly a win-win situation for patients through technology enhancements and a collection of analytics that helps in better diagnosis and treatment. Due to higher accuracy levels, IoMT devices are more reliable in reporting and data tracking and help avoid human errors and incorrect reporting.
Robotics for Cell Manipulation and Characterization provides fundamental principles underpinning robotic cell manipulation and characterization, state-of-the-art technical advances in micro/nano robotics, new discoveries of cell biology enabled by robotic systems, and their applications in clinical diagnosis and treatment. This book covers several areas, including robotics, control, computer vision, biomedical engineering and life sciences using understandable figures and tables to enhance readers' comprehension and pinpoint challenges and opportunities for biological and biomedical research.
Crypto is red-hot right now.
The modern business world faces many new challenges in preserving its confidentiality and data from online attackers. Further, it also faces a struggle with preventing fraud. These challenges threaten businesses internally and externally and can cause huge losses. It is essential for business leaders to be up to date on the current fraud prevention, confidentiality, and data security to protect their businesses. Fraud Prevention, Confidentiality, and Data Security for Modern Businesses provides examples and research on the security challenges, practices, and blueprints for today's data storage and analysis systems to protect against current and emerging attackers in the modern business world. It includes the organizational, strategic, and technological depth to design modern data security practices within any organization. Covering topics such as confidential communication, information security management, and social engineering, this premier reference source is an indispensable resource for business executives and leaders, entrepreneurs, IT managers, security specialists, students and educators of higher education, librarians, researchers, and academicians.
Originating from papers presented at the 18th International Conference on Railway Engineering Design and Operation, this book provides up-to-date research on the use of advanced systems, promoting their general awareness throughout the management, design, manufacture and operation of railways and other emerging passenger, freight and transit systems. A key emphasis is placed on the use of computer systems in advanced railway engineering. The included works are compiled from a variety of specialists interested in the development of railways, including managers, consultants, railway engineers, designers of advanced train control systems and computer specialists. Topics covered include: Traffic safety, security and monitoring; Train and railways analysis; Operation of rail networks; Advanced train control; Energy-efficient design; Traffic modelling and simulation.
Advances in Imaging and Electron Physics, Volume 226 merges two long-running serials, Advances in Electronics and Electron Physics and Advances in Optical and Electron Microscopy. Chapters in this release cover Characterization of nanomaterials properties using FE-TEM, Cold field-emission electron sources: From higher brightness to ultrafast beams, Every electron counts: Towards the development of aberration optimized and aberration corrected electron sources, and more. The series features articles on the physics of electron devices (especially semiconductor devices), particle optics at high and low energies, microlithography, image science, digital image processing, electromagnetic wave propagation, electron microscopy and the computing methods used in all these domains.
State Space Systems with Time-Delays Analysis, Identification and Applications covers the modeling, identification and control of industrial applications, including system identification, parameter estimation, dynamic simulation, nonlinear control, and other emerging techniques. The book introduces basic time-delay systems, architectures and control methods. Emphasis is placed on the mathematical analysis of these systems, identifying them, and applying them to practical engineering problems such as three independent water tank systems and distillation systems. This book contains a wide range of time-delay system identification methods that can help readers master the system controllers' design methods.
Facebook had a problem. Along with its sister platforms Instagram and WhatsApp, it was a daily destination for billions of users around the world, extolling its products for connecting people. But as a succession of scandals rocked Facebook from 2016, some began to question whether the company could control, or even understood, its own platforms. As Facebook employees searched for answers, what they uncovered was worse than they could've imagined. The problems ran far deeper than politics. Facebook was peddling and amplifying anger, looking the other way at human trafficking, enabling drug cartels and authoritarians and allowing VIP users to break the platform's supposedly inviolable rules. It turned out to be eminently possible to isolate many of Facebook's worst problems, but whenever employees offered solutions their work was consistently delayed, watered down or stifled by a company that valued user engagement above all else. The only option left was to blow the whistle. In Broken Code, award-winning Wall Street Journal reporter Jeff Horwitz tells the riveting inside story of these employees and their explosive discoveries, uncovering the shocking cost of Facebook's blind ambition in the process.
Reachable Sets of Dynamic Systems: Uncertainty, Sensitivity, and Complex Dynamics introduces differential inclusions, providing an overview as well as multiple examples of its interdisciplinary applications. The design of dynamic systems of any type is an important issue as is the influence of uncertainty in model parameters and model sensitivity. The possibility of calculating the reachable sets may be a powerful additional tool in such tasks. This book can help graduate students, researchers, and engineers working in the field of computer simulation and model building, in the calculation of reachable sets of dynamic models.
The promises and realities of digital innovation have come to suffuse everything from city regions to astronomy, government to finance, art to medicine, politics to warfare, and from genetics to reality itself. Digital systems augmenting physical space, buildings, and communities occupy a special place in the evolutionary discourse about advanced technology. The two Intelligent Environments books edited by Peter Droege span a quarter of a century across this genre. The second volume, Intelligent Environments: Advanced Systems for a Healthy Planet, asks: how does civilization approach thinking systems, intelligent spatial models, design methods, and support structures designed for sustainability, in ways that could counteract challenges to terrestrial habitability? This book examines a range of baseline and benchmark practices but also unusual and even sublime endeavors across regions, currencies, infrastructure, architecture, transactive electricity, geodesign, net-positive planning, remote work, integrated transport, and artificial intelligence in understanding the most immediate spatial setting: the human body. The result of this quest is both highly informative and useful, but also critical. It opens windows on what must fast become a central and overarching existential focus in the face of anthropogenic planetary heating and other threats-and raises concomitant questions about direction, scope, and speed of that change.
Studies on integer optimization in emergency management have attracted engineers and scientists from various disciplines such as management, mathematics, computer science, and other fields. Although there are a large number of literature reports on integer planning and emergency events, few books systematically explain the combination of the two. Researchers need a clear and thorough presentation of the theory and application of integer programming methods for emergency management. Integer Optimization and its Computation in Emergency Management investigates the computation theory of integer optimization, developing integer programming methods for emergency management and explores related practical applications. Pursuing a holistic approach, this book establishes a fundamental framework for this topic, intended for graduate students who are interested in operations research and optimization, researchers investigating emergency management, and algorithm design engineers working on integer programming or other optimization applications.
Cardiovascular and Coronary Artery Imaging, Volume Two presents the basics of echocardiography, nuclear imaging and magnetic resonance imaging (MRI) and provides insights into their appropriate use. The book covers state-of-the-art approaches for automated non-invasive systems for early cardiovascular and coronary artery disease diagnosis. It includes several prominent imaging modalities such as MRI, CT and PET technologies. Other sections focus on major trends and challenges in this area and present the latest techniques for cardiovascular and coronary image analysis.
Customized Production Through 3D Printing in Cloud Manufacturing explains how to combine the latest cloud manufacturing and additive manufacturing technology to find innovative solutions to important problems in research and industry. The manufacturing industry strives constantly to improve levels of product personalization for its customers, who have become increasingly demanding in this respect in recent decades. Among the tools currently growing in use in the industry, there is great potential to address this demand. Cloud manufacturing maps manufacturing resources and capabilities to the cloud, adding the capacity to gather decentralized manufacturing resources and use manufacturing services on-demand, and 3D printing provides strong support for truly individualized manufactured components. This is the first book to cover the whole lifecycle of 3D printing services in a cloud environment, including topics like: cloud servitization of 3D printers, 3D printing model design, supply-demand matching and scheduling, on-demand using and pricing, printing monitoring in cloud, and printing service evaluation. With a systematic introduction to this promising manufacturing paradigm, as well as coverage of models and service management to practical applications, this book will meet the needs of a broad range of researchers as well as practitioners.
The 130th volume is an eclectic volume inspired by recent issues of interest in research and development in computer science and computer engineering. The volume is a collection of five chapters.
A complete and authoritative discussion of systems engineering and neural networks In Systems Engineering Neural Networks, a team of distinguished researchers deliver a thorough exploration of the fundamental concepts underpinning the creation and improvement of neural networks with a systems engineering mindset. In the book, you'll find a general theoretical discussion of both systems engineering and neural networks accompanied by coverage of relevant and specific topics, from deep learning fundamentals to sport business applications. Readers will discover in-depth examples derived from many years of engineering experience, a comprehensive glossary with links to further reading, and supplementary online content. The authors have also included a variety of applications programmed in both Python 3 and Microsoft Excel. The book provides: A thorough introduction to neural networks, introduced as key element of complex systems Practical discussions of systems engineering and forecasting, complexity theory and optimization and how these techniques can be used to support applications outside of the traditional AI domains Comprehensive explorations of input and output, hidden layers, and bias in neural networks, as well as activation functions, cost functions, and back-propagation Guidelines for software development incorporating neural networks with a systems engineering methodology Perfect for students and professionals eager to incorporate machine learning techniques into their products and processes, Systems Engineering Neural Networks will also earn a place in the libraries of managers and researchers working in areas involving neural networks.
Management and Engineering of Critical Infrastructures focuses on two important aspects of CIS, management and engineering. The book provides an ontological foundation for the models and methods needed to design a set of systems, networks and assets that are essential for a society's functioning, and for ensuring the security, safety and economy of a nation. Various examples in agriculture, the water supply, public health, transportation, security services, electricity generation, telecommunication, and financial services can be used to substantiate dangers. Disruptions of CIS can have serious cascading consequences that would stop society from functioning properly and result in loss of life. Malicious software (a.k.a., malware), for example, can disrupt the distribution of electricity across a region, which in turn can lead to the forced shutdown of communication, health and financial sectors. Subsequently, proper engineering and management are important to anticipate possible risks and threats and provide resilient CIS. Although the problem of CIS has been broadly acknowledged and discussed, to date, no unifying theory nor systematic design methods, techniques and tools exist for such CIS.
Mathematical Methods in Data Science introduces a new approach based on network analysis to integrate big data into the framework of ordinary and partial differential equations for data analysis and prediction. The mathematics is accompanied with examples and problems arising in data science to demonstrate advanced mathematics, in particular, data-driven differential equations used. Chapters also cover network analysis, ordinary and partial differential equations based on recent published and unpublished results. Finally, the book introduces a new approach based on network analysis to integrate big data into the framework of ordinary and partial differential equations for data analysis and prediction. There are a number of books on mathematical methods in data science. Currently, all these related books primarily focus on linear algebra, optimization and statistical methods. However, network analysis, ordinary and partial differential equation models play an increasingly important role in data science. With the availability of unprecedented amount of clinical, epidemiological and social COVID-19 data, data-driven differential equation models have become more useful for infection prediction and analysis.
Data Analysis for Social Microblogging Platforms explores the nature of microblog datasets, also covering the larger field which focuses on information, data and knowledge in the context of natural language processing. The book investigates a range of significant computational techniques which enable data and computer scientists to recognize patterns in these vast datasets, including machine learning, data mining algorithms, rough set and fuzzy set theory, evolutionary computations, combinatorial pattern matching, clustering, summarization and classification. Chapters focus on basic online micro blogging data analysis research methodologies, community detection, summarization application development, performance evaluation and their applications in big data. |
You may like...
Responsive Web Design with HTML 5 & CSS
Jessica Minnick
Paperback
Systems Analysis And Design In A…
John Satzinger, Robert Jackson, …
Hardcover
(1)
Database Principles - Fundamentals of…
Carlos Coronel, Keeley Crockett, …
Paperback
|