|
Books > Computing & IT
There is a significant deficiency among contemporary medicine
practices reflected by experts making medical decisions for a large
proportion of the population for which no or minimal data exists.
Fortunately, our capacity to procure and apply such information is
rapidly rising. As medicine becomes more individualized, the
implementation of health IT and data interoperability become
essential components to delivering quality healthcare. Quality
Assurance in the Era of Individualized Medicine is a collection of
innovative research on the methods and utilization of digital
readouts to fashion an individualized therapy instead of a
mass-population-directed strategy. While highlighting topics
including assistive technologies, patient management, and clinical
practices, this book is ideally designed for health professionals,
doctors, nurses, hospital management, medical administrators, IT
specialists, data scientists, researchers, academicians, and
students.
BIG DATA, ARTIFICIAL INTELLIGENCE AND DATA ANALYSIS SET Coordinated
by Jacques Janssen Data analysis is a scientific field that
continues to grow enormously, most notably over the last few
decades, following rapid growth within the tech industry, as well
as the wide applicability of computational techniques alongside new
advances in analytic tools. Modeling enables data analysts to
identify relationships, make predictions, and to understand,
interpret and visualize the extracted information more
strategically. This book includes the most recent advances on this
topic, meeting increasing demand from wide circles of the
scientific community. Applied Modeling Techniques and Data Analysis
1 is a collective work by a number of leading scientists, analysts,
engineers, mathematicians and statisticians, working on the front
end of data analysis and modeling applications. The chapters cover
a cross section of current concerns and research interests in the
above scientific areas. The collected material is divided into
appropriate sections to provide the reader with both theoretical
and applied information on data analysis methods, models and
techniques, along with appropriate applications.
DHM and Posturography explores the body of knowledge and
state-of-the-art in digital human modeling, along with its
application in ergonomics and posturography. The book provides an
industry first introductory and practitioner focused overview of
human simulation tools, with detailed chapters describing elements
of posture, postural interactions, and fields of application. Thus,
DHM tools and a specific scientific/practical problem - the study
of posture - are linked in a coherent framework. In addition,
sections show how DHM interfaces with the most common physical
devices for posture analysis. Case studies provide the applied
knowledge necessary for practitioners to make informed decisions.
Digital Human Modelling is the science of representing humans with
their physical properties, characteristics and behaviors in
computerized, virtual models. These models can be used standalone,
or integrated with other computerized object design systems, to
design or study designs, workplaces or products in their
relationship with humans.
Advances in Domain Adaptation Theory gives current,
state-of-the-art results on transfer learning, with a particular
focus placed on domain adaptation from a theoretical point-of-view.
The book begins with a brief overview of the most popular concepts
used to provide generalization guarantees, including sections on
Vapnik-Chervonenkis (VC), Rademacher, PAC-Bayesian, Robustness and
Stability based bounds. In addition, the book explains domain
adaptation problem and describes the four major families of
theoretical results that exist in the literature, including the
Divergence based bounds. Next, PAC-Bayesian bounds are discussed,
including the original PAC-Bayesian bounds for domain adaptation
and their updated version. Additional sections present
generalization guarantees based on the robustness and stability
properties of the learning algorithm.
The concept of quantum computing is based on two fundamental
principles of quantum mechanics: superposition and entanglement.
Instead of using bits, qubits are used in quantum computing, which
is a key indicator in the high level of safety and security this
type of cryptography ensures. If interfered with or eavesdropped
in, qubits will delete or refuse to send, which keeps the
information safe. This is vital in the current era where sensitive
and important personal information can be digitally shared online.
In computer networks, a large amount of data is transferred
worldwide daily, including anything from military plans to a
country's sensitive information, and data breaches can be
disastrous. This is where quantum cryptography comes into play. By
not being dependent on computational power, it can easily replace
classical cryptography. Limitations and Future Applications of
Quantum Cryptography is a critical reference that provides
knowledge on the basics of IoT infrastructure using quantum
cryptography, the differences between classical and quantum
cryptography, and the future aspects and developments in this
field. The chapters cover themes that span from the usage of
quantum cryptography in healthcare, to forensics, and more. While
highlighting topics such as 5G networks, image processing,
algorithms, and quantum machine learning, this book is ideally
intended for security professionals, IoT developers, computer
scientists, practitioners, researchers, academicians, and students
interested in the most recent research on quantum computing.
Over the last two decades, researchers are looking at imbalanced
data learning as a prominent research area. Many critical
real-world application areas like finance, health, network, news,
online advertisement, social network media, and weather have
imbalanced data, which emphasizes the research necessity for
real-time implications of precise fraud/defaulter detection, rare
disease/reaction prediction, network intrusion detection, fake news
detection, fraud advertisement detection, cyber bullying
identification, disaster events prediction, and more. Machine
learning algorithms are based on the heuristic of
equally-distributed balanced data and provide the biased result
towards the majority data class, which is not acceptable
considering imbalanced data is omnipresent in real-life scenarios
and is forcing us to learn from imbalanced data for foolproof
application design. Imbalanced data is multifaceted and demands a
new perception using the novelty at sampling approach of data
preprocessing, an active learning approach, and a cost perceptive
approach to resolve data imbalance. The Handbook of Research on
Data Preprocessing, Active Learning, and Cost Perceptive Approaches
for Resolving Data Imbalance offers new aspects for imbalanced data
learning by providing the advancements of the traditional methods,
with respect to big data, through case studies and research from
experts in academia, engineering, and industry. The chapters
provide theoretical frameworks and the latest empirical research
findings that help to improve the understanding of the impact of
imbalanced data and its resolving techniques based on data
preprocessing, active learning, and cost perceptive approaches.
This book is ideal for data scientists, data analysts, engineers,
practitioners, researchers, academicians, and students looking for
more information on imbalanced data characteristics and solutions
using varied approaches.
This book is the essential guide for any student undertaking a
computing/IS project, and will give you everything you need to
achieve outstanding results. Undertaking a project is a key
component of nearly all computing/information systems degree
programmes at both undergraduate and postgraduate levels. Projects
in Computing and Information Systems covers the four key aspects of
project work (planning, conducting, presenting and taking the
project further) in chronological fashion, and provides the reader
with the skills to excel.
Big data generates around us constantly from daily business, custom
use, engineering, and science activities. Sensory data is collected
from the internet of things (IoT) and cyber-physical systems (CPS).
Merely storing such a massive amount of data is meaningless, as the
key point is to identify, locate, and extract valuable knowledge
from big data to forecast and support services. Such extracted
valuable knowledge is usually referred to as smart data. It is
vital to providing suitable decisions in business, science, and
engineering applications. Deep Learning Applications for
Cyber-Physical Systems provides researchers a platform to present
state-of-the-art innovations, research, and designs while
implementing methodological and algorithmic solutions to data
processing problems and designing and analyzing evolving trends in
health informatics and computer-aided diagnosis in deep learning
techniques in context with cyber physical systems. Covering topics
such as smart medical systems, intrusion detection systems, and
predictive analytics, this text is essential for computer
scientists, engineers, practitioners, researchers, students, and
academicians, especially those interested in the areas of internet
of things, machine learning, deep learning, and cyber-physical
systems.
Intelligent technologies have emerged as imperative tools in
computer science and information security. However, advanced
computing practices have preceded new methods of attacks on the
storage and transmission of data. Developing approaches such as
image processing and pattern recognition are susceptible to
breaches in security. Modern protection methods for these
innovative techniques require additional research. The Handbook of
Research on Intelligent Data Processing and Information Security
Systems provides emerging research exploring the theoretical and
practical aspects of cyber protection and applications within
computer science and telecommunications. Special attention is paid
to data encryption, steganography, image processing, and
recognition, and it targets professionals who want to improve their
knowledge in order to increase strategic capabilities and
organizational effectiveness. As such, this book is ideal for
analysts, programmers, computer engineers, software engineers,
mathematicians, data scientists, developers, IT specialists,
academicians, researchers, and students within fields of
information technology, information security, robotics, artificial
intelligence, image processing, computer science, and
telecommunications.
Digital humanities is a dynamic and emerging field that aspires to
enhance traditional research and scholarship through digital media.
Although countries around the world are witnessing the widespread
adoption of digital humanities, only a small portion of the
literature discusses its development in the Asia Pacific region.
Digital Humanities and Scholarly Research Trends in the
Asia-Pacific provides innovative insights into the development of
digital humanities and their ability to facilitate academic
exchange and preserve cultural heritage. The content covers
challenges including the need to maintain digital humanities
momentum in libraries and research communities, to increase
international collaboration, to maintain and promote developed
digital projects, to deploy and redeploy resources to support
research, and to build new skillsets and new professionals in the
library. It is designed for librarians, government agencies,
industry professionals, academicians, and researchers.
FOCAPD-19/Proceedings of the 9th International Conference on
Foundations of Computer-Aided Process Design, July 14 - 18, 2019,
compiles the presentations given at the Ninth International
Conference on Foundations of Computer-Aided Process Design,
FOCAPD-2019. It highlights the meetings held at this event that
brings together researchers, educators and practitioners to
identify new challenges and opportunities for process and product
design.
Advances in Imaging and Electron Physics, Volume 211, merges two
long-running serials, Advances in Electronics and Electron Physics
and Advances in Optical and Electron Microscopy. The series
features extended articles on the physics of electron devices
(especially semiconductor devices), particle optics at high and low
energies, microlithography, image science, digital image
processing, electromagnetic wave propagation, electron microscopy
and the computing methods used in all these domains.
Nowadays it is impossible to imagine a business without technology
as most industries are becoming ""smarter"" and more tech-driven,
ranging from small individual tech initiatives to complete business
models with intertwined supply chains and ""platform""-based
business models. New ways of working, such as agile and DevOps,
have been introduced, leading to new risks. These risks come in the
form of new challenges for teams working together in a distributed
manner, privacy concerns, human autonomy, and cybersecurity
concerns. Technology is now integrated into the business discipline
and is here to stay leading to the need for a thorough
understanding of how to address these risks and all the potential
problems that could arise. With the advent of organized crime, such
as hacks and denial-of-service attacks, all kinds of malicious
actors are infiltrating the digital society in new and unique ways.
Systems with poor design, implementation, and configurations are
easily taken advantage of. When it comes to integrating business
and technology, there needs to be approaches for assuring security
against risks that can threaten both businesses and their digital
platforms. Strategic Approaches to Digital Platform Security
Assurance offers comprehensive design science research approaches
to extensively examine risks in digital platforms and offer
pragmatic solutions to these concerns and challenges. This book
addresses significant problems when transforming an organization
embracing API-based platform models, the use of DevOps teams, and
issues in technological architectures. Each section will examine
the status quo for business technologies, the current challenges,
and core success factors and approaches that have been used. This
book is ideal for security analysts, software engineers, computer
engineers, executives, managers, IT consultants, business
professionals, researchers, academicians, and students who want to
gain insight and deeper knowledge of security in digital platforms
and gain insight into the most important success factors and
approaches utilized by businesses.
|
You may like...
Cliar
Cliar
CD
R518
Discovery Miles 5 180
Eadarainn
Rona Lightfoot
CD
R517
Discovery Miles 5 170
Holy Fvck
Demi Lovato
CD
R462
Discovery Miles 4 620
In Symphony
Albert Hammond
CD
R524
Discovery Miles 5 240
|