![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
Applying mechanisms and principles of human intelligence and converging the brain and artificial intelligence (AI) is currently a research trend. The applications of AI in brain simulation are countless. Brain-inspired intelligent systems will improve next-generation information processing by applying theories, techniques, and applications inspired by the information processing principles from the brain. Exploring Future Opportunities of Brain-Inspired Artificial Intelligence focuses on the convergence of AI with brain-inspired intelligence. It presents research on brain-inspired cognitive machines with vision, audition, language processing, and thinking capabilities. Covering topics such as data analysis tools, knowledge representation, and super-resolution, this premier reference source is an essential resource for engineers, developers, computer scientists, students and educators of higher education, librarians, researchers, and academicians.
Open source intelligence (OSINT) and web reconnaissance are rich topics for infosec professionals looking for the best ways to sift through the abundance of information widely available online. In many cases, the first stage of any security assessment-that is, reconnaissance-is not given enough attention by security professionals, hackers, and penetration testers. Often, the information openly present is as critical as the confidential data. Hacking Web Intelligence shows you how to dig into the Web and uncover the information many don't even know exists. The book takes a holistic approach that is not only about using tools to find information online but also how to link all the information and transform it into presentable and actionable intelligence. You will also learn how to secure your information online to prevent it being discovered by these reconnaissance methods. Hacking Web Intelligence is an in-depth technical reference covering the methods and techniques you need to unearth open source information from the Internet and utilize it for the purpose of targeted attack during a security assessment. This book will introduce you to many new and leading-edge reconnaissance, information gathering, and open source intelligence methods and techniques, including metadata extraction tools, advanced search engines, advanced browsers, power searching methods, online anonymity tools such as TOR and i2p, OSINT tools such as Maltego, Shodan, Creepy, SearchDiggity, Recon-ng, Social Network Analysis (SNA), Darkweb/Deepweb, data visualization, and much more.
Cognitive Systems and Signal Processing in Image Processing presents different frameworks and applications of cognitive signal processing methods in image processing. This book provides an overview of recent applications in image processing by cognitive signal processing methods in the context of Big Data and Cognitive AI. It presents the amalgamation of cognitive systems and signal processing in the context of image processing approaches in solving various real-word application domains. This book reports the latest progress in cognitive big data and sustainable computing. Various real-time case studies and implemented works are discussed for better understanding and more clarity to readers. The combined model of cognitive data intelligence with learning methods can be used to analyze emerging patterns, spot business opportunities, and take care of critical process-centric issues for computer vision in real-time.
The advancement in FinTech especially artificial intelligence (AI) and machine learning (ML), has significantly affected the way financial services are offered and adopted today. Important financial decisions such as investment decision making, macroeconomic analysis, and credit evaluation are getting more complex in the field of finance. ML is used in many financial companies which are making a significant impact on financial services. With the increasing complexity of financial transaction processes, ML can reduce operational costs through process automation which can automate repetitive tasks and increase productivity. Among others, ML can analyze large volumes of historical data and make better trading decisions to increase revenue. This book provides an exhaustive overview of the roles of AI and ML algorithms in financial sectors with special reference to complex financial applications such as financial risk management in a big data environment. In addition, it provides a collection of high-quality research works that address broad challenges in both theoretical and application aspects of AI in the field of finance.
Edward Snowden, the man who risked everything to expose the US government’s system of mass surveillance, reveals for the first time the story of his life, including how he helped to build that system and what motivated him to try to bring it down. In 2013, twenty-nine-year-old Edward Snowden shocked the world when he broke with the American intelligence establishment and revealed that the United States government was secretly pursuing the means to collect every single phone call, text message, and email. The result would be an unprecedented system of mass surveillance with the ability to pry into the private lives of every person on earth. Six years later, Snowden reveals for the very first time how he helped to build this system and why he was moved to expose it. Spanning the bucolic Beltway suburbs of his childhood and the clandestine CIA and NSA postings of his adulthood, Permanent Record is the extraordinary account of a bright young man who grew up online – a man who became a spy, a whistleblower, and, in exile, the Internet’s conscience. Written with wit, grace, passion, and an unflinching candor, Permanent Record is a crucial memoir of our digital age and destined to be a classic.
Data Prefetching Techniques in Computer Systems, Volume 125 provides an in-depth review of the latest progress on data prefetching research. Topics covered in this volume include temporal prefetchers, spatial prefetchers, non-spatial-temporal prefetchers, and evaluation of prefetchers, with insights on possible future research direction. Specific chapters in this release include Introduction to Data Prefetching, Spatial Prefetching Techniques, Temporal Prefetching Techniques, Domino prefetching scheme, Bingo prefetching method, and The Champion prefetcher.
The advent of the emerging fifth generation (5G) networks has changed the paradigm of how computing, electronics, and electrical (CEE) systems are interconnected. CEE devices and systems, with the help of the 5G technology, can now be seamlessly linked in a way that is rapidly turning the globe into a digital world. Smart cities and internet of things have come to stay but not without some challenges, which must be discussed. The Handbook of Research on 5G Networks and Advancements in Computing, Electronics, and Electrical Engineering focuses on current technological innovations as the world rapidly heads towards becoming a global smart city. It covers important topics such as power systems, electrical engineering, mobile communications, network, security, and more. This book examines vast types of technologies and their roles in society with a focus on how each works, the impacts it has, and the future for developing a global smart city. This book is ideal for both industrial and academic researchers, scientists, engineers, educators, practitioners, developers, policymakers, scholars, and students interested in 5G technology and the future of engineering, computing, and technology in human society.
The modern business world faces many new challenges in preserving its confidentiality and data from online attackers. Further, it also faces a struggle with preventing fraud. These challenges threaten businesses internally and externally and can cause huge losses. It is essential for business leaders to be up to date on the current fraud prevention, confidentiality, and data security to protect their businesses. Fraud Prevention, Confidentiality, and Data Security for Modern Businesses provides examples and research on the security challenges, practices, and blueprints for today's data storage and analysis systems to protect against current and emerging attackers in the modern business world. It includes the organizational, strategic, and technological depth to design modern data security practices within any organization. Covering topics such as confidential communication, information security management, and social engineering, this premier reference source is an indispensable resource for business executives and leaders, entrepreneurs, IT managers, security specialists, students and educators of higher education, librarians, researchers, and academicians.
The emergence of new technologies within the industrial revolution has transformed businesses to a new socio-digital era. In this new era, businesses are concerned with collecting data on customer needs, behaviors, and preferences for driving effective customer engagement and product development, as well as for crucial decision making. However, the ever-shifting behaviors of consumers provide many challenges for businesses to pinpoint the wants and needs of their audience. Consumer Behavior Change and Data Analytics in the Socio-Digital Era focuses on the concepts, theories, and analytical techniques to track consumer behavior change. It provides multidisciplinary research and practice focusing on social and behavioral analytics to track consumer behavior shifts and improve decision making among businesses. Covering topics such as consumer sentiment analysis, emotional intelligence, and online purchase decision making, this premier reference source is a timely resource for business executives, entrepreneurs, data analysts, marketers, advertisers, government officials, social media professionals, libraries, students and educators of higher education, researchers, and academicians.
Want to learn the basics of swing trading? Have you been losing and
would love to get some simple tips and tricks that will steer you to
the winning side?
Advances in Imaging and Electron Physics, Volume 219, merges two long-running serials, Advances in Electronics and Electron Physics and Advances in Optical and Electron Microscopy. The series features extended articles on the physics of electron devices (especially semiconductor devices), particle optics at high and low energies, microlithography, image science, digital image processing, electromagnetic wave propagation, electron microscopy and the computing methods used in all these domains.
Blockchain and artificial intelligence (AI) in industrial internet of things is an emerging field of research at the intersection of information science, computer science, and electronics engineering. The radical digitization of industry coupled with the explosion of the internet of things (IoT) has set up a paradigm shift for industrial and manufacturing companies. There exists a need for a comprehensive collection of original research of the best performing methods and state-of-the-art approaches in this area of blockchain, AI, and the industrial internet of things in this new era for industrial and manufacturing companies. Blockchain and AI Technology in the Industrial Internet of Things compares different approaches to the industrial internet of things and explores the direct impact blockchain and AI technology have on the betterment of the human life. The chapters provide the latest advances in the field and provide insights and concerns on the concept and growth of the industrial internet of things. While including research on security and privacy, supply chain management systems, performance analysis, and a variety of industries, this book is ideal for professionals, researchers, managers, technologists, security analysts, executives, practitioners, researchers, academicians, and students looking for advanced research and information on the newest technologies, advances, and approaches for blockchain and AI in the industrial internet of things.
Lean thinking involves more than just eliminating waste; through its five guiding principles-value, value chain, continuous flow, pull production, and perfection-its successful applications are commonly found in the manufacturing sector. Although its application and benefits to companies is no longer contested, it is rare to find works that consolidate applications of lean thinking in sectors that are unconventional, such as healthcare and government. Cases on Lean Thinking Applications in Unconventional Systems allows readers to broaden their view on lean thinking applications and visualize insights for research. It presents case studies and applications of lean thinking within several different industries. Covering topics such as emergency care units, standardized work, and national humanization policy, this case book is an essential resource for engineers, hospital administrators, healthcare professionals, IT managers, government officials, students and faculty of higher education, researchers, and academicians.
Wireless Communication Networks Supported by Autonomous UAVs and Mobile Ground Robots covers wireless sensor networks and cellular networks. For wireless sensor networks, the book presents approaches using mobile robots or UAVs to collect sensory data from sensor nodes. For cellular networks, it discusses the approaches to using UAVs to work as aerial base stations to serve cellular users. In addition, the book covers the challenges involved in these two networks, existing approaches (e.g., how to use the public transportation vehicles to play the role of mobile sinks to collect sensory data from sensor nodes), and potential methods to address open questions.
Machine Learning for Biometrics: Concepts, Algorithms and Applications highlights the fundamental concepts of machine learning, processing and analyzing data from biometrics and provides a review of intelligent and cognitive learning tools which can be adopted in this direction. Each chapter of the volume is supported by real-life case studies, illustrative examples and video demonstrations. The book elucidates various biometric concepts, algorithms and applications with machine intelligence solutions, providing guidance on best practices for new technologies such as e-health solutions, Data science, Cloud computing, and Internet of Things, etc. In each section, different machine learning concepts and algorithms are used, such as different object detection techniques, image enhancement techniques, both global and local feature extraction techniques, and classifiers those are commonly used data science techniques. These biometrics techniques can be used as tools in Cloud computing, Mobile computing, IOT based applications, and e-health care systems for secure login, device access control, personal recognition and surveillance. |
You may like...
Readings from CRYPTOLOGIA on the Enigma…
Brian J. Winkel, Cipher Deavors, …
Hardcover
R2,798
Discovery Miles 27 980
Compilers and Operating Systems for Low…
Luca Benini, Mahmut Kandemir, …
Hardcover
R2,786
Discovery Miles 27 860
The Continuing Arms Race - Code-Reuse…
Per Larsen, Ahmad-Reza Sadeghi
Hardcover
R2,482
Discovery Miles 24 820
BTEC Nationals Information Technology…
Jenny Phillips, Alan Jarvis, …
Paperback
R1,018
Discovery Miles 10 180
Rapid Automation - Concepts…
Information Reso Management Association
Hardcover
R9,397
Discovery Miles 93 970
|