|
Books > Computing & IT
The artificial intelligence subset machine learning has become a
popular technique in professional fields as many are finding new
ways to apply this trending technology into their everyday
practices. Two fields that have majorly benefited from this are
pattern recognition and information security. The ability of these
intelligent algorithms to learn complex patterns from data and
attain new performance techniques has created a wide variety of
uses and applications within the data security industry. There is a
need for research on the specific uses machine learning methods
have within these fields, along with future perspectives. Machine
Learning Techniques for Pattern Recognition and Information
Security is a collection of innovative research on the current
impact of machine learning methods within data security as well as
its various applications and newfound challenges. While
highlighting topics including anomaly detection systems,
biometrics, and intrusion management, this book is ideally designed
for industrial experts, researchers, IT professionals, network
developers, policymakers, computer scientists, educators, and
students seeking current research on implementing machine learning
tactics to enhance the performance of information security.
Every day approximately three-hundred thousand to four-hundred
thousand new malware are registered, many of them being adware and
variants of previously known malware. Anti-virus companies and
researchers cannot deal with such a deluge of malware - to analyze
and build patches. The only way to scale the efforts is to build
algorithms to enable machines to analyze malware and classify and
cluster them to such a level of granularity that it will enable
humans (or machines) to gain critical insights about them and build
solutions that are specific enough to detect and thwart existing
malware and generic-enough to thwart future variants. Advances in
Malware and Data-Driven Network Security comprehensively covers
data-driven malware security with an emphasis on using statistical,
machine learning, and AI as well as the current trends in
ML/statistical approaches to detecting, clustering, and
classification of cyber-threats. Providing information on advances
in malware and data-driven network security as well as future
research directions, it is ideal for graduate students,
academicians, faculty members, scientists, software developers,
security analysts, computer engineers, programmers, IT specialists,
and researchers who are seeking to learn and carry out research in
the area of malware and data-driven network security.
In recent years, falsification and digital modification of video
clips, images, as well as textual contents have become widespread
and numerous, especially when deepfake technologies are adopted in
many sources. Due to adopted deepfake techniques, a lot of content
currently cannot be recognized from its original sources. As a
result, the field of study previously devoted to general multimedia
forensics has been revived. The Handbook of Research on Advanced
Practical Approaches to Deepfake Detection and Applications
discusses the recent techniques and applications of illustration,
generation, and detection of deepfake content in multimedia. It
introduces the techniques and gives an overview of deepfake
applications, types of deepfakes, the algorithms and applications
used in deepfakes, recent challenges and problems, and practical
applications to identify, generate, and detect deepfakes. Covering
topics such as anomaly detection, intrusion detection, and security
enhancement, this major reference work is a comprehensive resource
for cyber security specialists, government officials, law
enforcement, business leaders, students and faculty of higher
education, librarians, researchers, and academicians.
Quantum computing is radically different from the conventional
approach of transforming bits strings from one set of 0's and 1's
to another. With quantum computing, everything changes. The physics
that we use to understand bits of information and the devices that
manipulate them are totally different. The way in which we build
such devices is different, requiring new materials, new design
rules and new processor architectures. Finally, the way we program
these systems is entirely different. Quantum engineering is a
revolutionary approach to quantum technology. It encompasses both
fundamental physics and the broad engineering skill-set necessary
to meet the practical challenges of the future. The proposed book
will cover the high-quality reviewed book chapters on original
research & innovations and compelling insights in Quantum
Computing and Engineering. Data scientists, Engineers, Industry,
researchers and students working in the field of quantum computing
and its allied research will benefit greatly from this publication.
Gamification is being used everywhere; despite its apparent
plethora of benefits, the unbalanced use of its main mechanics can
end up in catastrophic results for a company or institution.
Currently, there is a lack of knowledge of what it is, leading to
its unregulated and ad hoc use without any prior planning. This
unbalanced use prejudices the achievement of the initial goals and
impairs the user's evolution, bringing potential negative
reflections. Currently, there are few specifications and modeling
languages that allow the creation of a system of rules to serve as
the basis for a gamification engine. Consequently, programmers
implement gamification in a variety of ways, undermining any
attempt at reuse and negatively affecting interoperability.
Next-Generation Applications and Implementations of Gamification
Systems synthesizes all the trends, best practices, methodologies,
languages, and tools that are used to implement gamification. It
also discusses how to put gamification in action by linking
academic and informatics researchers with professionals who use
gamification in their daily work to disseminate and exchange the
knowledge, information, and technology provided by the
international communities in the area of gamification throughout
the 21st century. Covering topics such as applied and cloud
gamification, chatbots, deep learning, and certifications and
frameworks, this book is ideal for programmers, computer
scientists, software engineers, practitioners of technological
companies, managers, academicians, researchers, and students.
Edsger Wybe Dijkstra (1930-2002) was one of the most influential
researchers in the history of computer science, making fundamental
contributions to both the theory and practice of computing. Early
in his career, he proposed the single-source shortest path
algorithm, now commonly referred to as Dijkstra's algorithm. He
wrote (with Jaap Zonneveld) the first ALGOL 60 compiler, and
designed and implemented with his colleagues the influential THE
operating system. Dijkstra invented the field of concurrent
algorithms, with concepts such as mutual exclusion, deadlock
detection, and synchronization. A prolific writer and forceful
proponent of the concept of structured programming, he convincingly
argued against the use of the Go To statement. In 1972 he was
awarded the ACM Turing Award for "fundamental contributions to
programming as a high, intellectual challenge; for eloquent
insistence and practical demonstration that programs should be
composed correctly, not just debugged into correctness; for
illuminating perception of problems at the foundations of program
design." Subsequently he invented the concept of self-stabilization
relevant to fault-tolerant computing. He also devised an elegant
language for nondeterministic programming and its weakest
precondition semantics, featured in his influential 1976 book A
Discipline of Programming in which he advocated the development of
programs in concert with their correctness proofs. In the later
stages of his life, he devoted much attention to the development
and presentation of mathematical proofs, providing further support
to his long-held view that the programming process should be viewed
as a mathematical activity. In this unique new book, 31 computer
scientists, including five recipients of the Turing Award, present
and discuss Dijkstra's numerous contributions to computing science
and assess their impact. Several authors knew Dijkstra as a friend,
teacher, lecturer, or colleague. Their biographical essays and
tributes provide a fascinating multi-author picture of Dijkstra,
from the early days of his career up to the end of his life.
With rapid technological advances and the increasing impact of the
internet, the world is literally at our fingertips. Yet many
churches have yet to discover how to tap into this powerful
resource. "The Internet Church" shows church leaders how to start
from square one in creating an interactive website that can greatly
expand the ministry potential of a church. Walter Wilson, an
internet expert and committed Christian, describes how technology
can enhance evangelism outreach, and challenges leaders to take
advantage of unprecedented opportunities in the new digital age.
Python is today's fastest growing programming language. This
engaging and refreshingly different guide breaks down the skills
into clear step-by-step chunks and explains the theory using brief
easy-to-understand language. Rather than bamboozling readers with
pages of mind-numbing technical jargon, this book includes 150
practical challenges, putting the power in the reader's hands.
Through creating programs to solve these challenges the reader will
quickly progress from mastering the basics to confidently using
subroutines, a graphical user interface, and linking to external
text, csv and SQL files. This book is perfect for anyone who wants
to learn how to program with Python. In particular, students
starting out in computer science and teachers who want to improve
their confidence in Python will find here a set of ready-made
challenges for classroom use.
Advanced computational intelligence techniques have been designed
and developed in recent years to cope with various big data
challenges and provide fast and efficient analytics that assist in
making critical decisions. With the rapid evolution and development
of internet-based services and applications, this technology is
receiving attention from researchers, industries, and academic
communities and requires additional study. Convergence of Big Data
Technologies and Computational Intelligent Techniques considers
recent advancements in big data and computational intelligence
across fields and disciplines and discusses the various
opportunities and challenges of adoption. Covering topics such as
deep learning, data mining, smart environments, and
high-performance computing, this reference work is crucial for
computer scientists, engineers, industry professionals,
researchers, scholars, practitioners, academicians, instructors,
and students.
The topic of creativity has only been on the fringes of pedagogy as
it has been deemed either abstract or not measurable and therefore
non-standardizable for educational purposes. However, most
progressive educators from around the world used creativity as a
means for cultural reformation and as a means of social justice.
The focus of this edited book will be on culture and creativity.
Chapters will consider various topics related to creativity such as
- Is creativity cultural? How can creativity and culturally
relevant pedagogy go together? Given the current state of education
all over the world due to the Pandemic, topics related to
creativity and teaching remotely will also be featured. Teachers
often say one of two things - they are not creative or that they
don't have the time to be creative given the curricular,
administrative directions they are required to follow. However,
each day, teachers find exceptionally creative ways to engage their
students. Especially in the current situation of remote learning,
teachers are relying on their creativity to not only create
impactful lessons but also teach them creative lessons. While the
focus of this book will be around the topic of culture and
creativity, asking how it may be cultural; it will also cover a
wide range of topics related to creativity and pedagogy as noted in
the list of topics. Essentially, this book will ask if creativity
is cultural, what implications does this have in terms of
cultivating or teaching/learning creativity?
Blockchain has the potential to revolutionize how people and
organizations, who may not know or trust each other, share
information and carry out transactions online. Nearly every
institution on the planet wants to be a leader in blockchain
technology as well as a home to significant platforms,
applications, and companies. There is a need for a glocal policy to
meet and support these goals as blockchain technology must embrace
glocal values and ideals in its legal and regulatory frameworks.
Glocal Policy and Strategies for Blockchain: Building Ecosystems
and Sustainability discusses the features and advantages of
blockchain technology, the innovative applications of blockchain
technology, and the potent and limited aspects of blockchain
technology. Covering topics such as digital change, international
policy, and cyber security governance, this reference work is ideal
for industry professionals, researchers, academicians, scholars,
practitioners, instructors, and students.
|
You may like...
Cilka's Journey
Heather Morris
Paperback
(4)
R431
R397
Discovery Miles 3 970
|