![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
Deep Reinforcement Learning for Wireless Communications and Networking Comprehensive guide to Deep Reinforcement Learning (DRL) as applied to wireless communication systems Deep Reinforcement Learning for Wireless Communications and Networking presents an overview of the development of DRL while providing fundamental knowledge about theories, formulation, design, learning models, algorithms and implementation of DRL together with a particular case study to practice. The book also covers diverse applications of DRL to address various problems in wireless networks, such as caching, offloading, resource sharing, and security. The authors discuss open issues by introducing some advanced DRL approaches to address emerging issues in wireless communications and networking. Covering new advanced models of DRL, e.g., deep dueling architecture and generative adversarial networks, as well as emerging problems considered in wireless networks, e.g., ambient backscatter communication, intelligent reflecting surfaces and edge intelligence, this is the first comprehensive book studying applications of DRL for wireless networks that presents the state-of-the-art research in architecture, protocol, and application design. Deep Reinforcement Learning for Wireless Communications and Networking covers specific topics such as: Deep reinforcement learning models, covering deep learning, deep reinforcement learning, and models of deep reinforcement learning Physical layer applications covering signal detection, decoding, and beamforming, power and rate control, and physical-layer security Medium access control (MAC) layer applications, covering resource allocation, channel access, and user/cell association Network layer applications, covering traffic routing, network classification, and network slicing With comprehensive coverage of an exciting and noteworthy new technology, Deep Reinforcement Learning for Wireless Communications and Networking is an essential learning resource for researchers and communications engineers, along with developers and entrepreneurs in autonomous systems, who wish to harness this technology in practical applications.
Fractional Order Systems: An Overview of Mathematics, Design, and Applications for Engineers introduces applications from a design perspective, helping readers plan and design their own applications. The book includes the different techniques employed to design fractional-order systems/devices comprehensively and straightforwardly. Furthermore, mathematics is available in the literature on how to solve fractional-order calculus for system applications. This book introduces the mathematics that has been employed explicitly for fractional-order systems. It will prove an excellent material for students and scholars who want to quickly understand the field of fractional-order systems and contribute to its different domains and applications. Fractional-order systems are believed to play an essential role in our day-to-day activities. Therefore, several researchers around the globe endeavor to work in the different domains of fractional-order systems. The efforts include developing the mathematics to solve fractional-order calculus/systems and to achieve the feasible designs for various applications of fractional-order systems.
5G IoT and Edge Computing for Smart Healthcare addresses the importance of a 5G IoT and Edge-Cognitive-Computing-based system for the successful implementation and realization of a smart-healthcare system. The book provides insights on 5G technologies, along with intelligent processing algorithms/processors that have been adopted for processing the medical data that would assist in addressing the challenges in computer-aided diagnosis and clinical risk analysis on a real-time basis. Each chapter is self-sufficient, solving real-time problems through novel approaches that help the audience acquire the right knowledge. With the progressive development of medical and communication - computer technologies, the healthcare system has seen a tremendous opportunity to support the demand of today's new requirements.
Human-Centered Artificial Intelligence: Research and Applications presents current theories, fundamentals, techniques and diverse applications of human-centered AI. Sections address the question, "are AI models explainable, interpretable and understandable?, introduce readers to the design and development process, including mind perception and human interfaces, explore various applications of human-centered AI, including human-robot interaction, healthcare and decision-making, and more. As human-centered AI aims to push the boundaries of previously limited AI solutions to bridge the gap between machine and human, this book is an ideal update on the latest advances.
Applying mechanisms and principles of human intelligence and converging the brain and artificial intelligence (AI) is currently a research trend. The applications of AI in brain simulation are countless. Brain-inspired intelligent systems will improve next-generation information processing by applying theories, techniques, and applications inspired by the information processing principles from the brain. Exploring Future Opportunities of Brain-Inspired Artificial Intelligence focuses on the convergence of AI with brain-inspired intelligence. It presents research on brain-inspired cognitive machines with vision, audition, language processing, and thinking capabilities. Covering topics such as data analysis tools, knowledge representation, and super-resolution, this premier reference source is an essential resource for engineers, developers, computer scientists, students and educators of higher education, librarians, researchers, and academicians.
Open source intelligence (OSINT) and web reconnaissance are rich topics for infosec professionals looking for the best ways to sift through the abundance of information widely available online. In many cases, the first stage of any security assessment-that is, reconnaissance-is not given enough attention by security professionals, hackers, and penetration testers. Often, the information openly present is as critical as the confidential data. Hacking Web Intelligence shows you how to dig into the Web and uncover the information many don't even know exists. The book takes a holistic approach that is not only about using tools to find information online but also how to link all the information and transform it into presentable and actionable intelligence. You will also learn how to secure your information online to prevent it being discovered by these reconnaissance methods. Hacking Web Intelligence is an in-depth technical reference covering the methods and techniques you need to unearth open source information from the Internet and utilize it for the purpose of targeted attack during a security assessment. This book will introduce you to many new and leading-edge reconnaissance, information gathering, and open source intelligence methods and techniques, including metadata extraction tools, advanced search engines, advanced browsers, power searching methods, online anonymity tools such as TOR and i2p, OSINT tools such as Maltego, Shodan, Creepy, SearchDiggity, Recon-ng, Social Network Analysis (SNA), Darkweb/Deepweb, data visualization, and much more.
Cognitive Systems and Signal Processing in Image Processing presents different frameworks and applications of cognitive signal processing methods in image processing. This book provides an overview of recent applications in image processing by cognitive signal processing methods in the context of Big Data and Cognitive AI. It presents the amalgamation of cognitive systems and signal processing in the context of image processing approaches in solving various real-word application domains. This book reports the latest progress in cognitive big data and sustainable computing. Various real-time case studies and implemented works are discussed for better understanding and more clarity to readers. The combined model of cognitive data intelligence with learning methods can be used to analyze emerging patterns, spot business opportunities, and take care of critical process-centric issues for computer vision in real-time.
The advancement in FinTech especially artificial intelligence (AI) and machine learning (ML), has significantly affected the way financial services are offered and adopted today. Important financial decisions such as investment decision making, macroeconomic analysis, and credit evaluation are getting more complex in the field of finance. ML is used in many financial companies which are making a significant impact on financial services. With the increasing complexity of financial transaction processes, ML can reduce operational costs through process automation which can automate repetitive tasks and increase productivity. Among others, ML can analyze large volumes of historical data and make better trading decisions to increase revenue. This book provides an exhaustive overview of the roles of AI and ML algorithms in financial sectors with special reference to complex financial applications such as financial risk management in a big data environment. In addition, it provides a collection of high-quality research works that address broad challenges in both theoretical and application aspects of AI in the field of finance.
Edward Snowden, the man who risked everything to expose the US government’s system of mass surveillance, reveals for the first time the story of his life, including how he helped to build that system and what motivated him to try to bring it down. In 2013, twenty-nine-year-old Edward Snowden shocked the world when he broke with the American intelligence establishment and revealed that the United States government was secretly pursuing the means to collect every single phone call, text message, and email. The result would be an unprecedented system of mass surveillance with the ability to pry into the private lives of every person on earth. Six years later, Snowden reveals for the very first time how he helped to build this system and why he was moved to expose it. Spanning the bucolic Beltway suburbs of his childhood and the clandestine CIA and NSA postings of his adulthood, Permanent Record is the extraordinary account of a bright young man who grew up online – a man who became a spy, a whistleblower, and, in exile, the Internet’s conscience. Written with wit, grace, passion, and an unflinching candor, Permanent Record is a crucial memoir of our digital age and destined to be a classic.
Data Prefetching Techniques in Computer Systems, Volume 125 provides an in-depth review of the latest progress on data prefetching research. Topics covered in this volume include temporal prefetchers, spatial prefetchers, non-spatial-temporal prefetchers, and evaluation of prefetchers, with insights on possible future research direction. Specific chapters in this release include Introduction to Data Prefetching, Spatial Prefetching Techniques, Temporal Prefetching Techniques, Domino prefetching scheme, Bingo prefetching method, and The Champion prefetcher.
The advent of the emerging fifth generation (5G) networks has changed the paradigm of how computing, electronics, and electrical (CEE) systems are interconnected. CEE devices and systems, with the help of the 5G technology, can now be seamlessly linked in a way that is rapidly turning the globe into a digital world. Smart cities and internet of things have come to stay but not without some challenges, which must be discussed. The Handbook of Research on 5G Networks and Advancements in Computing, Electronics, and Electrical Engineering focuses on current technological innovations as the world rapidly heads towards becoming a global smart city. It covers important topics such as power systems, electrical engineering, mobile communications, network, security, and more. This book examines vast types of technologies and their roles in society with a focus on how each works, the impacts it has, and the future for developing a global smart city. This book is ideal for both industrial and academic researchers, scientists, engineers, educators, practitioners, developers, policymakers, scholars, and students interested in 5G technology and the future of engineering, computing, and technology in human society.
The modern business world faces many new challenges in preserving its confidentiality and data from online attackers. Further, it also faces a struggle with preventing fraud. These challenges threaten businesses internally and externally and can cause huge losses. It is essential for business leaders to be up to date on the current fraud prevention, confidentiality, and data security to protect their businesses. Fraud Prevention, Confidentiality, and Data Security for Modern Businesses provides examples and research on the security challenges, practices, and blueprints for today's data storage and analysis systems to protect against current and emerging attackers in the modern business world. It includes the organizational, strategic, and technological depth to design modern data security practices within any organization. Covering topics such as confidential communication, information security management, and social engineering, this premier reference source is an indispensable resource for business executives and leaders, entrepreneurs, IT managers, security specialists, students and educators of higher education, librarians, researchers, and academicians.
The emergence of new technologies within the industrial revolution has transformed businesses to a new socio-digital era. In this new era, businesses are concerned with collecting data on customer needs, behaviors, and preferences for driving effective customer engagement and product development, as well as for crucial decision making. However, the ever-shifting behaviors of consumers provide many challenges for businesses to pinpoint the wants and needs of their audience. Consumer Behavior Change and Data Analytics in the Socio-Digital Era focuses on the concepts, theories, and analytical techniques to track consumer behavior change. It provides multidisciplinary research and practice focusing on social and behavioral analytics to track consumer behavior shifts and improve decision making among businesses. Covering topics such as consumer sentiment analysis, emotional intelligence, and online purchase decision making, this premier reference source is a timely resource for business executives, entrepreneurs, data analysts, marketers, advertisers, government officials, social media professionals, libraries, students and educators of higher education, researchers, and academicians.
Want to learn the basics of swing trading? Have you been losing and
would love to get some simple tips and tricks that will steer you to
the winning side?
Advances in Imaging and Electron Physics, Volume 219, merges two long-running serials, Advances in Electronics and Electron Physics and Advances in Optical and Electron Microscopy. The series features extended articles on the physics of electron devices (especially semiconductor devices), particle optics at high and low energies, microlithography, image science, digital image processing, electromagnetic wave propagation, electron microscopy and the computing methods used in all these domains.
Blockchain and artificial intelligence (AI) in industrial internet of things is an emerging field of research at the intersection of information science, computer science, and electronics engineering. The radical digitization of industry coupled with the explosion of the internet of things (IoT) has set up a paradigm shift for industrial and manufacturing companies. There exists a need for a comprehensive collection of original research of the best performing methods and state-of-the-art approaches in this area of blockchain, AI, and the industrial internet of things in this new era for industrial and manufacturing companies. Blockchain and AI Technology in the Industrial Internet of Things compares different approaches to the industrial internet of things and explores the direct impact blockchain and AI technology have on the betterment of the human life. The chapters provide the latest advances in the field and provide insights and concerns on the concept and growth of the industrial internet of things. While including research on security and privacy, supply chain management systems, performance analysis, and a variety of industries, this book is ideal for professionals, researchers, managers, technologists, security analysts, executives, practitioners, researchers, academicians, and students looking for advanced research and information on the newest technologies, advances, and approaches for blockchain and AI in the industrial internet of things. |
You may like...
Introducing Delphi Programming - Theory…
John Barrow, Linda Miller, …
Paperback
(1)R751 Discovery Miles 7 510
Systems Analysis And Design In A…
John Satzinger, Robert Jackson, …
Hardcover
(1)
Database Principles - Fundamentals of…
Carlos Coronel, Keeley Crockett, …
Paperback
|