![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
Stories brought us together.
Elon Musk calls artificial intelligence a “supersonic tsunami” headed toward humanity. Microsoft AI CEO Mustafa Suleyman warns that in as little as 12 to 18 months, AI could automate nearly every task white collar workers perform. Anthropic CEO Dario Amodei says that within the next 12 months to five years, AI could unleash a jobs bloodbath that disrupts half of all entry-level white-collar jobs. So, as President Donald Trump leads the nation through AI’s seismic shifts, Americans are left asking the defining question of our time: Is AI hype or hope, promise or peril, existential threat or the next great technological leap toward prosperity and human flourishing? The answer will affect everything, because AI is not just about jobs. It will shape whether our children are educated or indoctrinated. Whether people form relationships with other human beings or with machines. How and what we worship. And who lives or dies on the battlefield as AI warfare accelerates. All of it will shock-test our civic order. And whether we are ready or not, you do not get to opt out of the AI revolution. That decision has already been made for you. Today, 99% of Americans use AI—even if most of us don’t realize it. For conservatives, this is a Code Red moment. Big Tech is quietly hard-coding left-wing ideology into the algorithms that now govern daily life. The Left is already weaponizing AI while conservatives sleepwalk straight into calamity, unless they're ready for what's coming. In Code Red, Breitbart social media director Wynton Hall exposes where that power hides, how it operates, how conservatives can navigate the AI political battlescape, avert its landmines, and turn peril into promise. AI decides what you see and what gets censored. It’s quietly rewiring our whole way of life. The solution? Americans need a “code”: a set of principles and solutions rooted in the red political worldview to navigate the upheaval and stay ahead. Inside Code Red, you will discover: Urgent, deeply researched, and written with page-turner elegance, Code Red is the conservative battle plan for the AI era. Either we wake up and fight back, or we lose everything that made America free.
Artificial Intelligence for Neurological Disorders provides a comprehensive resource of state-of-the-art approaches for AI, big data analytics and machine learning-based neurological research. The book discusses many machine learning techniques to detect neurological diseases at the cellular level, as well as other applications such as image segmentation, classification and image indexing, neural networks and image processing methods. Chapters include AI techniques for the early detection of neurological disease and deep learning applications using brain imaging methods like EEG, MEG, fMRI, fNIRS and PET for seizure prediction or neuromuscular rehabilitation. The goal of this book is to provide readers with broad coverage of these methods to encourage an even wider adoption of AI, Machine Learning and Big Data Analytics for problem-solving and stimulating neurological research and therapy advances.
14th International Symposium on Process Systems Engineering, Volume 49 brings together the international community of researchers and engineers interested in computing-based methods in process engineering. The conference highlights the contributions of the PSE community towards the sustainability of modern society and is based on the 2021 event held in Tokyo, Japan, July 1-23, 2021. It contains contributions from academia and industry, establishing the core products of PSE, defining the new and changing scope of our results, and covering future challenges. Plenary and keynote lectures discuss real-world challenges (globalization, energy, environment and health) and contribute to discussions on the widening scope of PSE versus the consolidation of the core topics of PSE.
Hardware Accelerator Systems for Artificial Intelligence and Machine Learning, Volume 122 delves into arti?cial Intelligence and the growth it has seen with the advent of Deep Neural Networks (DNNs) and Machine Learning. Updates in this release include chapters on Hardware accelerator systems for artificial intelligence and machine learning, Introduction to Hardware Accelerator Systems for Artificial Intelligence and Machine Learning, Deep Learning with GPUs, Edge Computing Optimization of Deep Learning Models for Specialized Tensor Processing Architectures, Architecture of NPU for DNN, Hardware Architecture for Convolutional Neural Network for Image Processing, FPGA based Neural Network Accelerators, and much more.
In an increasingly globalised world, despite reductions in costs and time, transportation has become even more important as a facilitator of economic and human interaction; this is reflected in technical advances in transportation systems, increasing interest in how transportation interacts with society and the need to provide novel approaches to understanding its impacts. This has become particularly acute with the impact that Covid-19 has had on transportation across the world, at local, national and international levels. Encyclopedia of Transportation, Seven Volume Set - containing almost 600 articles - brings a cross-cutting and integrated approach to all aspects of transportation from a variety of interdisciplinary fields including engineering, operations research, economics, geography and sociology in order to understand the changes taking place. Emphasising the interaction between these different aspects of research, it offers new solutions to modern-day problems related to transportation. Each of its nine sections is based around familiar themes, but brings together the views of experts from different disciplinary perspectives. Each section is edited by a subject expert who has commissioned articles from a range of authors representing different disciplines, different parts of the world and different social perspectives. The nine sections are structured around the following themes: Transport Modes; Freight Transport and Logistics; Transport Safety and Security; Transport Economics; Traffic Management; Transport Modelling and Data Management; Transport Policy and Planning; Transport Psychology; Sustainability and Health Issues in Transportation. Some articles provide a technical introduction to a topic whilst others provide a bridge between topics or a more future-oriented view of new research areas or challenges. The end result is a reference work that offers researchers and practitioners new approaches, new ways of thinking and novel solutions to problems. All-encompassing and expertly authored, this outstanding reference work will be essential reading for all students and researchers interested in transportation and its global impact in what is a very uncertain world.
Women and Cyber Rights in Africa explores the challenges faced by African women in cyberspace, highlighting the exacerbation of gender inequalities by emerging technologies. Authored by African female researchers, it employs multidisciplinary approaches and Afro-feminist theories to discuss biases, stereotypes, and the impact of patriarchal structures. The book addresses limited digital literacy, gendered cyber-criminality, and inadequate gender-sensitive policies. It aims to spur effective policy development and further research on African women's cyber rights.
The 29th European Symposium on Computer Aided Process Engineering, contains the papers presented at the 29th European Symposium of Computer Aided Process Engineering (ESCAPE) event held in Eindhoven, The Netherlands, from June 16-19, 2019. It is a valuable resource for chemical engineers, chemical process engineers, researchers in industry and academia, students, and consultants for chemical industries.
Advances in Imaging and Electron Physics, Volume 208, merges two long-running serials, Advances in Electronics and Electron Physics and Advances in Optical and Electron Microscopy. The series features extended articles on the physics of electron devices (especially semiconductor devices), particle optics at high and low energies, microlithography, image science, digital image processing, electromagnetic wave propagation, electron microscopy and the computing methods used in all these domains.
Dark Silicon and the Future of On-chip Systems, Volume 110, the latest release in the Advances in Computers series published since 1960, presents detailed coverage of innovations in computer hardware, software, theory, design and applications, with this release focusing on an Introduction to dark silicon and future processors, a Revisiting of processor allocation and application mapping in future CMPs in the dark silicon era, Multi-objectivism in the dark silicon age, Dark silicon aware resource management for many-core systems, Dynamic power management for dark silicon multi-core processors, Topology specialization for networks-on-chip in the dark silicon era, and Emerging SRAM-based FPGA architectures.
Advances in Imaging and Electron Physics, Volume 207, merges two long-running serials, Advances in Electronics and Electron Physics and Advances in Optical and Electron Microscopy. The series features extended articles on the physics of electron devices (especially semiconductor devices), particle optics at high and low energies, microlithography, image science, digital image processing, electromagnetic wave propagation, electron microscopy and the computing methods used in all these domains.
Advances in Imaging and Electron Physics, Volume 205 is the latest release in this series that merges two long-running serials, Advances in Electronics and Electron Physics and Advances in Optical and Electron Microscopy. The series features extended articles on the physics of electron devices (especially semiconductor devices), particle optics at high and low energies, microlithography, image science, and digital image processing, electromagnetic wave propagation, electron microscopy, and the computing methods used in all these domains.
Safety of Web Applications: Risks, Encryption and Handling Vulnerabilities with PHP explores many areas that can help computer science students and developers integrate security into their applications. The Internet is not secure, but it's very friendly as a tool for storing and manipulating data. Customer confidence in Internet software is based on it's ability to prevent damage and attacks, but secure software is complicated, depending on several factors, including good risk estimation, good code architecture, cyphering, web server configuration, coding to prevent the most common attacks, and identification and rights allocation.
Distributed Systems: Concurrency and Consistency explores the gray area of distributed systems and draws a map of weak consistency criteria, identifying several families and demonstrating how these may be implemented into a programming language. Unlike their sequential counterparts, distributed systems are much more difficult to design, and are therefore prone to problems. On a large scale, usability reminiscent of sequential consistency, which would provide the same global view to all users, is very expensive or impossible to achieve. This book investigates the best ways to specify the objects that are still possible to implement in these systems.
Big Data and Smart Service Systems presents the theories and applications regarding Big Data and smart service systems, data acquisition, smart cities, business decision-making support, and smart service design. The rapid development of computer and Internet technologies has led the world to the era of Big Data. Big Data technologies are widely used, which has brought unprecedented impacts on traditional industries and lifestyle. More and more governments, business sectors, and institutions begin to realize data is becoming the most valuable asset and its analysis is becoming the core competitiveness.
Inside Computer Music is an investigation of how new technological developments have influenced the creative possibilities of composers of computer music in the last 50 years. This book combines detailed research into the development of computer music techniques with nine case studies that analyze key works in the musical and technical development of computer music. The book's companion website offers demonstration videos of the techniques used and downloadable software. There, readers can view interviews and test emulations of the software used by the composers for themselves. The software also presents musical analyses of each of the nine case studies to enable readers to engage with the musical structure aurally and interactively.
In RIOT Control, security experts from McAfee discuss how the Internet of Things (IoT) flips the current internet with de-centralized, uncontrolled elements driving massive data from the ends into central servers and the cloud, rather than the other way around. Some estimates suggest that every human being will soon be surrounded by 1,000 to 5,000 connected objects eventually, 100 trillion static or moving objects which makes for a complex system, prone to unexpected behaviors. As various industry domains rush to adopt IoT technologies, they need guidance on IoT-ready security and risk management practices to ensure system availability and security. This book explains IoT risk in terms of project requirements,
business needs, and system designs that include endpoints, network
connectivity, and cloud-based data centers. Understand the threats
and vulnerabilities of the IoT, as well as performance metrics at
the enterprise level. In recommending emerging techniques, the
authors provide insight to help judge which are best according to
specific risks and organizational needs under consideration.
Multiple case studies span several chapters to better illustrate
the business, operational, and technical risks inherent in IoT
deployments.
Temporal Data Mining via Unsupervised Ensemble Learning provides the principle knowledge of temporal data mining in association with unsupervised ensemble learning and the fundamental problems of temporal data clustering from different perspectives. By providing three proposed ensemble approaches of temporal data clustering, this book presents a practical focus of fundamental knowledge and techniques, along with a rich blend of theory and practice. Furthermore, the book includes illustrations of the proposed approaches based on data and simulation experiments to demonstrate all methodologies, and is a guide to the proper usage of these methods. As there is nothing universal that can solve all problems, it is important to understand the characteristics of both clustering algorithms and the target temporal data so the correct approach can be selected for a given clustering problem. Scientists, researchers, and data analysts working with machine learning and data mining will benefit from this innovative book, as will undergraduate and graduate students following courses in computer science, engineering, and statistics.
|
You may like...
Fundamentals of Relational Database…
S. Sumathi, S. Esakkirajan
Hardcover
R5,309
Discovery Miles 53 090
SQL: 1999 - Understanding Relational…
Jim Melton, Alan R. Simon
Paperback
Database Systems: The Complete Book…
Hector Garcia-Molina, Jeffrey Ullman, …
Paperback
|