0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (9)
  • R250 - R500 (63)
  • R500+ (5,680)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > General theory of computing > Data structures

Big Data, Political Campaigning and the Law - Democracy and Privacy in the Age of Micro-Targeting (Paperback): Normann Witzleb,... Big Data, Political Campaigning and the Law - Democracy and Privacy in the Age of Micro-Targeting (Paperback)
Normann Witzleb, Moira Paterson, Janice Richardson
R1,295 Discovery Miles 12 950 Ships in 12 - 17 working days

In this multidisciplinary book, experts from around the globe examine how data-driven political campaigning works, what challenges it poses for personal privacy and democracy, and how emerging practices should be regulated. The rise of big data analytics in the political process has triggered official investigations in many countries around the world, and become the subject of broad and intense debate. Political parties increasingly rely on data analytics to profile the electorate and to target specific voter groups with individualised messages based on their demographic attributes. Political micro-targeting has become a major factor in modern campaigning, because of its potential to influence opinions, to mobilise supporters and to get out votes. The book explores the legal, philosophical and political dimensions of big data analytics in the electoral process. It demonstrates that the unregulated use of big personal data for political purposes not only infringes voters' privacy rights, but also has the potential to jeopardise the future of the democratic process, and proposes reforms to address the key regulatory and ethical questions arising from the mining, use and storage of massive amounts of voter data. Providing an interdisciplinary assessment of the use and regulation of big data in the political process, this book will appeal to scholars from law, political science, political philosophy and media studies, policy makers and anyone who cares about democracy in the age of data-driven political campaigning.

IP Routing Protocols - Link-State and Path-Vector Routing Protocols (Hardcover): James Aweya IP Routing Protocols - Link-State and Path-Vector Routing Protocols (Hardcover)
James Aweya
R5,204 Discovery Miles 52 040 Ships in 12 - 17 working days

This book discusses link-state routing protocols (OSPF and IS-IS), and the path-vector routing protocol (BGP). It covers their most identifying characteristics, operations, and the databases they maintain. Material is presented from a practicing engineer's perspective, linking theory and fundamental concepts to common practices and real-world examples. Every aspect of the book is written to reflect current best practices using real-world examples. The book begins with a detailed description of the OSPF area types and hierarchical routing, and the different types of routers used in an OSPF autonomous system. The author goes on to describe in detail the different OSPF packet types, and inbound and outbound processing of OSPF link-state advertisements (LSAs). Next, the book gives an overview of the main features of IS-IS. The author then discusses the two-level routing hierarchy for controlling the distribution of intra-domain (Level 1) and inter-domain (Level 2) routing information within an IS-IS routing domain. He then describes in detail IS-IS network address formats, IS-IS routing metrics, IS-IS packet types, IS-IS network types and adjacency formation, IS-IS LSDB and synchronization, and IS-IS authentication. The book then reviews the main concepts of path-vector routing protocols, and describes BGP packet types, BGP session states and Finite State Machine, BGP path attributes types, and BGP Autonomous System Numbers (ASNs). Focuses solely on link-state routing protocols (OSPF and IS-IS), and the only path-vector routing protocol in use today (BGP). Reviews the basic concepts underlying the design of IS-IS and provides a detailed description of IS-IS area types and hierarchical routing, and the different types of routers used by IS-IS. Discusses the two-level routing hierarchy for controlling the distribution of intra-domain (Level 1) and inter-domain (Level 2) routing information within an IS-IS routing domain. Describes in detail BGP packet types, BGP session states and Finite State Machine, BGP path attributes types, and BGP ASNs, includes a high-level view of the typical BGP router and its components, and inbound and outbound message processing. James Aweya, PhD, is a chief research scientist at the Etisalat British Telecom Innovation Center (EBTIC), Khalifa University, Abu Dhabi, UAE. He has authored four books including this book and is a senior member of the Institute of Electrical and Electronics Engineers (IEEE).

IP Routing Protocols - Fundamentals and Distance-Vector Routing Protocols (Hardcover): James Aweya IP Routing Protocols - Fundamentals and Distance-Vector Routing Protocols (Hardcover)
James Aweya
R5,191 Discovery Miles 51 910 Ships in 12 - 17 working days

This book focuses on the fundamental concepts of IP routing and distance-vector routing protocols (RIPv2 and EIGRP). It discusses routing protocols from a practicing engineer's perspective, linking theory and fundamental concepts to common practices and everyday examples. The book benefits and reflects the author's more than 22 years of designing and working with IP routing devices and protocols (and Telecoms systems, in general). Every aspect of the book is written to reflect current best practices using real-world examples. This book describes the various methods used by routers to learn routing information. The author includes discussion of the characteristics of the different dynamic routing protocols, and how they differ in design and operation. He explains the processing steps involved in forwarding IP packets through an IP router to their destination and discusses the various mechanisms IP routers use for controlling routing in networks. The discussion is presented in a simple style to make it comprehensible and appealing to undergraduate and graduate level students, research and practicing engineers, scientists, IT personnel, and network engineers. It is geared toward readers who want to understand the concepts and theory of IP routing protocols, through real-world example systems and networks. Focuses on the fundamental concepts of IP routing and distance-vector routing protocols (RIPv2 and EIGRP). Describes the various methods used by routers to learn routing information. Includes discussion of the characteristics of the different dynamic routing protocols, and how they differ in design and operation. Provides detailed descriptions of the most common distance-vector routing protocols RIPv2 and EIGRP. Discusses the various mechanisms IP routers use for controlling routing in networks. James Aweya, PhD, is a chief research scientist at the Etisalat British Telecom Innovation Center (EBTIC), Khalifa University, Abu Dhabi, UAE. He has authored four books including this book and is a senior member of the Institute of Electrical and Electronics Engineers (IEEE).

Soft Computing Techniques in Engineering, Health, Mathematical and Social Sciences (Hardcover): Pradip Debnath, S. A. Mohiuddine Soft Computing Techniques in Engineering, Health, Mathematical and Social Sciences (Hardcover)
Pradip Debnath, S. A. Mohiuddine
R3,256 Discovery Miles 32 560 Ships in 12 - 17 working days

Soft computing techniques are no longer limited to the arena of computer science. The discipline has an exponentially growing demand in other branches of science and engineering and even into health and social science. This book contains theory and applications of soft computing in engineering, health, and social and applied sciences. Different soft computing techniques such as artificial neural networks, fuzzy systems, evolutionary algorithms and hybrid systems are discussed. It also contains important chapters in machine learning and clustering. This book presents a survey of the existing knowledge and also the current state of art development through original new contributions from the researchers. This book may be used as a one-stop reference book for a broad range of readers worldwide interested in soft computing. In each chapter, the preliminaries have been presented first and then the advanced discussion takes place. Learners and researchers from a wide variety of backgrounds will find several useful tools and techniques to develop their soft computing skills. This book is meant for graduate students, faculty and researchers willing to expand their knowledge in any branch of soft computing. The readers of this book will require minimum prerequisites of undergraduate studies in computation and mathematics.

Text Mining with Machine Learning - Principles and Techniques (Paperback): Jan Zizka, Frantisek Darena, Arnost Svoboda Text Mining with Machine Learning - Principles and Techniques (Paperback)
Jan Zizka, Frantisek Darena, Arnost Svoboda
R1,490 Discovery Miles 14 900 Ships in 12 - 17 working days

This book provides a perspective on the application of machine learning-based methods in knowledge discovery from natural languages texts. By analysing various data sets, conclusions which are not normally evident, emerge and can be used for various purposes and applications. The book provides explanations of principles of time-proven machine learning algorithms applied in text mining together with step-by-step demonstrations of how to reveal the semantic contents in real-world datasets using the popular R-language with its implemented machine learning algorithms. The book is not only aimed at IT specialists, but is meant for a wider audience that needs to process big sets of text documents and has basic knowledge of the subject, e.g. e-mail service providers, online shoppers, librarians, etc. The book starts with an introduction to text-based natural language data processing and its goals and problems. It focuses on machine learning, presenting various algorithms with their use and possibilities, and reviews the positives and negatives. Beginning with the initial data pre-processing, a reader can follow the steps provided in the R-language including the subsuming of various available plug-ins into the resulting software tool. A big advantage is that R also contains many libraries implementing machine learning algorithms, so a reader can concentrate on the principal target without the need to implement the details of the algorithms her- or himself. To make sense of the results, the book also provides explanations of the algorithms, which supports the final evaluation and interpretation of the results. The examples are demonstrated using realworld data from commonly accessible Internet sources.

Applied Evolutionary Algorithms for Engineers using Python (Hardcover): Leonardo Azevedo Scardua Applied Evolutionary Algorithms for Engineers using Python (Hardcover)
Leonardo Azevedo Scardua
R4,589 Discovery Miles 45 890 Ships in 12 - 17 working days

This book meant for those who seek to apply evolutionary algorithms to problems in engineering and science. To this end, it provides the theoretical background necessary to the understanding of the presented evolutionary algorithms and their shortcomings, while also discussing themes that are pivotal to the successful application of evolutionary algorithms to real-world problems. The theoretical descriptions are illustrated with didactical Python implementations of the algorithms, which not only allow readers to consolidate their understanding, but also provide a sound starting point for those intending to apply evolutionary algorithms to optimization problems in their working fields. Python has been chosen due to its widespread adoption in the Artificial Intelligence community. Those familiar with high level languages such as MATLAB (TM) will not have any difficulty in reading the Python implementations of the evolutionary algorithms provided in the book. Instead of attempting to encompass most of the existing evolutionary algorithms, past and present, the book focuses on those algorithms that researchers have recently applied to difficult optimization problems, such as control problems with continuous action spaces and the training of high-dimensional convolutional neural-networks. The basic characteristics of real-world optimization problems are presented, together with recommendations on its proper application to evolutionary algorithms. The applied nature of the book is reinforced by the presentation of successful cases of the application of evolutionary algorithms to optimization problems. This is complemented by Python source codes, giving users an insight into the idiosyncrasies of the practical application of evolutionary algorithms.

Genomic Sequence Analysis for Exon Prediction Using Adaptive Signal Processing Algorithms (Hardcover): Srinivasareddy Putluri,... Genomic Sequence Analysis for Exon Prediction Using Adaptive Signal Processing Algorithms (Hardcover)
Srinivasareddy Putluri, Md. Zia Ur Rahman
R4,133 Discovery Miles 41 330 Ships in 12 - 17 working days

This book addresses the issue of improving the accuracy in exon prediction in DNA sequences using various adaptive techniques based on different performance measures that are crucial in disease diagnosis and therapy. First, the authors present an overview of genomics engineering, structure of DNA sequence and its building blocks, genetic information flow in a cell, gene prediction along with its significance, and various types of gene prediction methods, followed by a review of literature starting with the biological background of genomic sequence analysis. Next, they cover various theoretical considerations of adaptive filtering techniques used for DNA analysis, with an introduction to adaptive filtering, properties of adaptive algorithms, and the need for development of adaptive exon predictors (AEPs) and structure of AEP used for DNA analysis. Then, they extend the approach of least mean squares (LMS) algorithm and its sign-based realizations with normalization factor for DNA analysis. They also present the normalized logarithmic-based realizations of least mean logarithmic squares (LMLS) and least logarithmic absolute difference (LLAD) adaptive algorithms that include normalized LMLS (NLMLS) algorithm, normalized LLAD (NLLAD) algorithm, and their signed variants. This book ends with an overview of the goals achieved and highlights the primary achievements using all proposed techniques. This book is intended to provide rigorous use of adaptive signal processing algorithms for genetic engineering, biomedical engineering, and bioinformatics and is useful for undergraduate and postgraduate students. This will also serve as a practical guide for Ph.D. students and researchers and will provide a number of research directions for further work. Features Presents an overview of genomics engineering, structure of DNA sequence and its building blocks, genetic information flow in a cell, gene prediction along with its significance, and various types of gene prediction methods Covers various theoretical considerations of adaptive filtering techniques used for DNA analysis, introduction to adaptive filtering, properties of adaptive algorithms, need for development of adaptive exon predictors (AEPs), and structure of AEP used for DNA analysis Extends the approach of LMS algorithm and its sign-based realizations with normalization factor for DNA analysis Presents the normalized logarithmic-based realizations of LMLS and LLAD adaptive algorithms that include normalized LMLS (NLMLS) algorithm, normalized LLAD (NLLAD) algorithm, and their signed variants Provides an overview of the goals achieved and highlights the primary achievements using all proposed techniques Dr. Md. Zia Ur Rahman is a professor in the Department of Electronics and Communication Engineering at Koneru Lakshmaiah Educational Foundation (K. L. University), Guntur, India. His current research interests include adaptive signal processing, biomedical signal processing, genetic engineering, medical imaging, array signal processing, medical telemetry, and nanophotonics. Dr. Srinivasareddy Putluri is currently a Software Engineer at Tata Consultancy Services Ltd., Hyderabad. He received his Ph.D. degree (Genomic Signal Processing using Adaptive Signal Processing algorithms) from the Department of Electronics and Communication Engineering at Koneru Lakshmaiah Educational Foundation (K. L. University), Guntur, India. His research interests include genomic signal processing and adaptive signal processing. He has published 15 research papers in various journals and proceedings. He is currently a reviewer of publishers like the IEEE Access and IGI.

Soft Computing Techniques for Engineering Optimization (Paperback): Kaushik Kumar, Supriyo Roy, J. Paulo Davim Soft Computing Techniques for Engineering Optimization (Paperback)
Kaushik Kumar, Supriyo Roy, J. Paulo Davim
R1,431 Discovery Miles 14 310 Ships in 12 - 17 working days

This book covers the issues related to optimization of engineering and management problems using soft computing techniques with an industrial outlook. It covers a broad area related to real life complex decision making problems using a heuristics approach. It also explores a wide perspective and future directions in industrial engineering research on a global platform/scenario. The book highlights the concept of optimization, presents various soft computing techniques, offers sample problems, and discusses related software programs complete with illustrations. Features Explains the concept of optimization and relevance to soft computing techniques towards optimal solution in engineering and management Presents various soft computing techniques Offers problems and their optimization using various soft computing techniques Discusses related software programs, with illustrations Provides a step-by-step tutorial on how to handle relevant software for obtaining the optimal solution to various engineering problems

Data Structure and Software Engineering - Challenges and Improvements (Paperback): James L. Antonakos Data Structure and Software Engineering - Challenges and Improvements (Paperback)
James L. Antonakos
R2,595 Discovery Miles 25 950 Ships in 12 - 17 working days

This title includes a number of Open Access chapters. Data structure and software engineering is an integral part of computer science. This volume presents new approaches and methods to knowledge sharing, brain mapping, data integration, and data storage. The author describes how to manage an organization's business process and domain data and presents new software and hardware testing methods. The book introduces a game development framework used as a learning aid in a software engineering at the university level. It also features a review of social software engineering metrics and methods for processing business information. It explains how to use Pegasys to create and manage sequence analysis workflows.

Polygonal Approximation and Scale-Space Analysis of Closed Digital Curves (Paperback): Kumar S. Ray, Bimal Kumar  Ray Polygonal Approximation and Scale-Space Analysis of Closed Digital Curves (Paperback)
Kumar S. Ray, Bimal Kumar Ray
R2,600 Discovery Miles 26 000 Ships in 12 - 17 working days

This book covers the most important topics in the area of pattern recognition, object recognition, computer vision, robot vision, medical computing, computational geometry, and bioinformatics systems. Students and researchers will find a comprehensive treatment of polygonal approximation and its real life applications. The book not only explains the theoretical aspects but also presents applications with detailed design parameters. The systematic development of the concept of polygonal approximation of digital curves and its scale-space analysis are useful and attractive to scholars in many fields.

Algorithmic Techniques for the Polymer Sciences (Paperback): Bradley S. Tice Algorithmic Techniques for the Polymer Sciences (Paperback)
Bradley S. Tice
R2,580 Discovery Miles 25 800 Ships in 12 - 17 working days

This new book-the first of its kind-examines the use of algorithmic techniques to compress random and non-random sequential strings found in chains of polymers. The book is an introduction to algorithmic complexity. Examples taken from current research in the polymer sciences are used for compression of like-natured properties as found on a chain of polymers. Both theory and applied aspects of algorithmic compression are reviewed. A description of the types of polymers and their uses is followed by a chapter on various types of compression systems that can be used to compress polymer chains into manageable units. The work is intended for graduate and postgraduate university students in the physical sciences and engineering.

Large Deviations For Performance Analysis - Queues, Communication and Computing (Paperback): Alan Weiss, Adam Shwartz Large Deviations For Performance Analysis - Queues, Communication and Computing (Paperback)
Alan Weiss, Adam Shwartz
R1,489 Discovery Miles 14 890 Ships in 12 - 17 working days

Originally published in 1995, Large Deviations for Performance Analysis consists of two synergistic parts. The first half develops the theory of large deviations from the beginning, through recent results on the theory for processes with boundaries, keeping to a very narrow path: continuous-time, discrete-state processes. By developing only what is needed for the applications, the theory is kept to a manageable level, both in terms of length and in terms of difficulty. Within its scope, the treatment is detailed, comprehensive and self-contained. As the book shows, there are sufficiently many interesting applications of jump Markov processes to warrant a special treatment. The second half is a collection of applications developed at Bell Laboratories. The applications cover large areas of the theory of communication networks: circuit switched transmission, packet transmission, multiple access channels, and the M/M/1 queue. Aspects of parallel computation are covered as well including, basics of job allocation, rollback-based parallel simulation, assorted priority queueing models that might be used in performance models of various computer architectures, and asymptotic coupling of processors. These applications are thoroughly analysed using the tools developed in the first half of the book.

IP Routing Protocols - Link-State and Path-Vector Routing Protocols (Paperback): James Aweya IP Routing Protocols - Link-State and Path-Vector Routing Protocols (Paperback)
James Aweya
R2,174 Discovery Miles 21 740 Ships in 12 - 17 working days

This book discusses link-state routing protocols (OSPF and IS-IS), and the path-vector routing protocol (BGP). It covers their most identifying characteristics, operations, and the databases they maintain. Material is presented from a practicing engineer's perspective, linking theory and fundamental concepts to common practices and real-world examples. Every aspect of the book is written to reflect current best practices using real-world examples. The book begins with a detailed description of the OSPF area types and hierarchical routing, and the different types of routers used in an OSPF autonomous system. The author goes on to describe in detail the different OSPF packet types, and inbound and outbound processing of OSPF link-state advertisements (LSAs). Next, the book gives an overview of the main features of IS-IS. The author then discusses the two-level routing hierarchy for controlling the distribution of intra-domain (Level 1) and inter-domain (Level 2) routing information within an IS-IS routing domain. He then describes in detail IS-IS network address formats, IS-IS routing metrics, IS-IS packet types, IS-IS network types and adjacency formation, IS-IS LSDB and synchronization, and IS-IS authentication. The book then reviews the main concepts of path-vector routing protocols, and describes BGP packet types, BGP session states and Finite State Machine, BGP path attributes types, and BGP Autonomous System Numbers (ASNs). Focuses solely on link-state routing protocols (OSPF and IS-IS), and the only path-vector routing protocol in use today (BGP). Reviews the basic concepts underlying the design of IS-IS and provides a detailed description of IS-IS area types and hierarchical routing, and the different types of routers used by IS-IS. Discusses the two-level routing hierarchy for controlling the distribution of intra-domain (Level 1) and inter-domain (Level 2) routing information within an IS-IS routing domain. Describes in detail BGP packet types, BGP session states and Finite State Machine, BGP path attributes types, and BGP ASNs, includes a high-level view of the typical BGP router and its components, and inbound and outbound message processing. James Aweya, PhD, is a chief research scientist at the Etisalat British Telecom Innovation Center (EBTIC), Khalifa University, Abu Dhabi, UAE. He has authored four books including this book and is a senior member of the Institute of Electrical and Electronics Engineers (IEEE).

IP Routing Protocols - Fundamentals and Distance-Vector Routing Protocols (Paperback): James Aweya IP Routing Protocols - Fundamentals and Distance-Vector Routing Protocols (Paperback)
James Aweya
R2,160 Discovery Miles 21 600 Ships in 12 - 17 working days

This book focuses on the fundamental concepts of IP routing and distance-vector routing protocols (RIPv2 and EIGRP). It discusses routing protocols from a practicing engineer's perspective, linking theory and fundamental concepts to common practices and everyday examples. The book benefits and reflects the author's more than 22 years of designing and working with IP routing devices and protocols (and Telecoms systems, in general). Every aspect of the book is written to reflect current best practices using real-world examples. This book describes the various methods used by routers to learn routing information. The author includes discussion of the characteristics of the different dynamic routing protocols, and how they differ in design and operation. He explains the processing steps involved in forwarding IP packets through an IP router to their destination and discusses the various mechanisms IP routers use for controlling routing in networks. The discussion is presented in a simple style to make it comprehensible and appealing to undergraduate and graduate level students, research and practicing engineers, scientists, IT personnel, and network engineers. It is geared toward readers who want to understand the concepts and theory of IP routing protocols, through real-world example systems and networks. Focuses on the fundamental concepts of IP routing and distance-vector routing protocols (RIPv2 and EIGRP). Describes the various methods used by routers to learn routing information. Includes discussion of the characteristics of the different dynamic routing protocols, and how they differ in design and operation. Provides detailed descriptions of the most common distance-vector routing protocols RIPv2 and EIGRP. Discusses the various mechanisms IP routers use for controlling routing in networks. James Aweya, PhD, is a chief research scientist at the Etisalat British Telecom Innovation Center (EBTIC), Khalifa University, Abu Dhabi, UAE. He has authored four books including this book and is a senior member of the Institute of Electrical and Electronics Engineers (IEEE).

Transportation Networks - A Quantitative Treatment (Hardcover): D. Teodorovic Transportation Networks - A Quantitative Treatment (Hardcover)
D. Teodorovic
R2,859 Discovery Miles 28 590 Ships in 12 - 17 working days

Originally published in 1986 and a major contribution towards improving operations within transportation systems, this book provides detailed coverage of the theory of transportation networks as a general traffic and transportation discipline. It examines some of the daily difficulties encountered by traffic and transportation experts, uncovering the intricacies of vehicle routing and scheduling, crew planning and facilities placement. This problem-solving approach uses multiple numerical examples and simple mathematical methods to enable newcomers to apply the book's solutions to the situations they encounter on the job.

Artificial Intelligence for the Internet of Health Things (Hardcover): K Shankar, Eswaran Perumal, Deepak Gupta Artificial Intelligence for the Internet of Health Things (Hardcover)
K Shankar, Eswaran Perumal, Deepak Gupta
R3,705 Discovery Miles 37 050 Ships in 12 - 17 working days

This book discusses research in Artificial Intelligence for the Internet of Health Things. It investigates and explores the possible applications of machine learning, deep learning, soft computing, and evolutionary computing techniques in design, implementation, and optimization of challenging healthcare solutions. This book features a wide range of topics such as AI techniques, IoT, cloud, wearables, and secured data transmission. Written for a broad audience, this book will be useful for clinicians, health professionals, engineers, technology developers, IT consultants, researchers, and students interested in the AI-based healthcare applications. Provides a deeper understanding of key AI algorithms and their use and implementation within the wider healthcare sector Explores different disease diagnosis models using machine learning, deep learning, healthcare data analysis, including machine learning, and data mining and soft computing algorithms Discusses detailed IoT, wearables, and cloud-based disease diagnosis model for intelligent systems and healthcare Reviews different applications and challenges across the design, implementation, and management of intelligent systems and healthcare data networks Introduces a new applications and case studies across all areas of AI in healthcare data K. Shankar (Member, IEEE) is a Postdoctoral Fellow of the Department of Computer Applications, Alagappa University, Karaikudi, India. Eswaran Perumal is an Assistant Professor of the Department of Computer Applications, Alagappa University, Karaikudi, India. Dr. Deepak Gupta is an Assistant Professor of the Department Computer Science & Engineering, Maharaja Agrasen Institute of Technology (GGSIPU), Delhi, India.

Hidden Markov Models - Theory and Implementation using MATLAB (R) (Paperback): Joao Paulo Coelho, Tatiana M. Pinho, Jose... Hidden Markov Models - Theory and Implementation using MATLAB (R) (Paperback)
Joao Paulo Coelho, Tatiana M. Pinho, Jose Boaventura-Cunha
R1,537 Discovery Miles 15 370 Ships in 12 - 17 working days

This book presents, in an integrated form, both the analysis and synthesis of three different types of hidden Markov models. Unlike other books on the subject, it is generic and does not focus on a specific theme, e.g. speech processing. Moreover, it presents the translation of hidden Markov models' concepts from the domain of formal mathematics into computer codes using MATLAB (R). The unique feature of this book is that the theoretical concepts are first presented using an intuition-based approach followed by the description of the fundamental algorithms behind hidden Markov models using MATLAB (R). This approach, by means of analysis followed by synthesis, is suitable for those who want to study the subject using a more empirical approach. Key Selling Points: Presents a broad range of concepts related to Hidden Markov Models (HMM), from simple problems to advanced theory Covers the analysis of both continuous and discrete Markov chains Discusses the translation of HMM concepts from the realm of formal mathematics into computer code Offers many examples to supplement mathematical notation when explaining new concepts

Machine Learning for Computer and Cyber Security - Principle, Algorithms, and Practices (Paperback): Brij B. Gupta, Quan Z.... Machine Learning for Computer and Cyber Security - Principle, Algorithms, and Practices (Paperback)
Brij B. Gupta, Quan Z. Sheng
R1,600 Discovery Miles 16 000 Ships in 12 - 17 working days

While Computer Security is a broader term which incorporates technologies, protocols, standards and policies to ensure the security of the computing systems including the computer hardware, software and the information stored in it, Cyber Security is a specific, growing field to protect computer networks (offline and online) from unauthorized access, botnets, phishing scams, etc. Machine learning is a branch of Computer Science which enables computing machines to adopt new behaviors on the basis of observable and verifiable data and information. It can be applied to ensure the security of the computers and the information by detecting anomalies using data mining and other such techniques. This book will be an invaluable resource to understand the importance of machine learning and data mining in establishing computer and cyber security. It emphasizes important security aspects associated with computer and cyber security along with the analysis of machine learning and data mining based solutions. The book also highlights the future research domains in which these solutions can be applied. Furthermore, it caters to the needs of IT professionals, researchers, faculty members, scientists, graduate students, research scholars and software developers who seek to carry out research and develop combating solutions in the area of cyber security using machine learning based approaches. It is an extensive source of information for the readers belonging to the field of Computer Science and Engineering, and Cyber Security professionals. Key Features: This book contains examples and illustrations to demonstrate the principles, algorithms, challenges and applications of machine learning and data mining for computer and cyber security. It showcases important security aspects and current trends in the field. It provides an insight of the future research directions in the field. Contents of this book help to prepare the students for exercising better defense in terms of understanding the motivation of the attackers and how to deal with and mitigate the situation using machine learning based approaches in better manner.

Arc-Search Techniques for Interior-Point Methods (Hardcover): Yaguang Yang Arc-Search Techniques for Interior-Point Methods (Hardcover)
Yaguang Yang
R4,007 Discovery Miles 40 070 Ships in 12 - 17 working days

This book discusses an important area of numerical optimization, called interior-point method. This topic has been popular since the 1980s when people gradually realized that all simplex algorithms were not convergent in polynomial time and many interior-point algorithms could be proved to converge in polynomial time. However, for a long time, there was a noticeable gap between theoretical polynomial bounds of the interior-point algorithms and efficiency of these algorithms. Strategies that were important to the computational efficiency became barriers in the proof of good polynomial bounds. The more the strategies were used in algorithms, the worse the polynomial bounds became. To further exacerbate the problem, Mehrotra's predictor-corrector (MPC) algorithm (the most popular and efficient interior-point algorithm until recently) uses all good strategies and fails to prove the convergence. Therefore, MPC does not have polynomiality, a critical issue with the simplex method. This book discusses recent developments that resolves the dilemma. It has three major parts. The first, including Chapters 1, 2, 3, and 4, presents some of the most important algorithms during the development of the interior-point method around the 1990s, most of them are widely known. The main purpose of this part is to explain the dilemma described above by analyzing these algorithms' polynomial bounds and summarizing the computational experience associated with them. The second part, including Chapters 5, 6, 7, and 8, describes how to solve the dilemma step-by-step using arc-search techniques. At the end of this part, a very efficient algorithm with the lowest polynomial bound is presented. The last part, including Chapters 9, 10, 11, and 12, extends arc-search techniques to some more general problems, such as convex quadratic programming, linear complementarity problem, and semi-definite programming.

Anyone Can Code - The Art and Science of Logical Creativity (Hardcover): Ali Arya Anyone Can Code - The Art and Science of Logical Creativity (Hardcover)
Ali Arya
R4,557 Discovery Miles 45 570 Ships in 12 - 17 working days

Anyone Can Code: The Art and Science of Logical Creativity introduces computer programming as a way of problem-solving through logical thinking. It uses the notion of modularization as a central lens through which we can make sense of many software concepts. This book takes the reader through fundamental concepts in programming by illustrating them in three different and distinct languages: C/C++, Python, and Javascript. Key features: Focuses on problem-solving and algorithmic thinking instead of programming functions, syntax, and libraries; Includes engaging examples, including video games and visual effects; Provides exercises and reflective questions. This book gives beginner and intermediate learners a strong understanding of what they are doing so that they can do it better and with any other tool or language that they may end up using later.

Machine Learning - Theory and Practice (Hardcover): Jugal Kalita Machine Learning - Theory and Practice (Hardcover)
Jugal Kalita
R3,407 Discovery Miles 34 070 Ships in 12 - 17 working days

Machine Learning: Theory and Practice provides an introduction to the most popular methods in machine learning. The book covers regression including regularization, tree-based methods including Random Forests and Boosted Trees, Artificial Neural Networks including Convolutional Neural Networks (CNNs), reinforcement learning, and unsupervised learning focused on clustering. Topics are introduced in a conceptual manner along with necessary mathematical details. The explanations are lucid, illustrated with figures and examples. For each machine learning method discussed, the book presents appropriate libraries in the R programming language along with programming examples. Features: Provides an easy-to-read presentation of commonly used machine learning algorithms in a manner suitable for advanced undergraduate or beginning graduate students, and mathematically and/or programming-oriented individuals who want to learn machine learning on their own. Covers mathematical details of the machine learning algorithms discussed to ensure firm understanding, enabling further exploration Presents worked out suitable programming examples, thus ensuring conceptual, theoretical and practical understanding of the machine learning methods. This book is aimed primarily at introducing essential topics in Machine Learning to advanced undergraduates and beginning graduate students. The number of topics has been kept deliberately small so that it can all be covered in a semester or a quarter. The topics are covered in depth, within limits of what can be taught in a short period of time. Thus, the book can provide foundations that will empower a student to read advanced books and research papers.

Algebraic Structures in Natural Language (Hardcover): Shalom Lappin, Jean-Philippe Bernardy Algebraic Structures in Natural Language (Hardcover)
Shalom Lappin, Jean-Philippe Bernardy
R2,212 Discovery Miles 22 120 Ships in 12 - 17 working days

Addresses a central problem in cognitive science, concerning the learning procedures through which humans acquire and represent natural language. Brings together world leading scholars from a range of disciplines, includingcomputational linguistics, psychology, behavioural science, and mathematical linguistics. Will appeal to researchers in computational and mathematical linguistics, psychology and behavioral science, AI and NLP. Represents a wide spectrum of perspectives

Discrete Mathematics for Computer Science - An Example-Based Introduction (Hardcover): Jon Pierre Fortney Discrete Mathematics for Computer Science - An Example-Based Introduction (Hardcover)
Jon Pierre Fortney
R4,599 Discovery Miles 45 990 Ships in 12 - 17 working days

Discrete Mathematics for Computer Science: An Example-Based Introduction is intended for a first- or second-year discrete mathematics course for computer science majors. It covers many important mathematical topics essential for future computer science majors, such as algorithms, number representations, logic, set theory, Boolean algebra, functions, combinatorics, algorithmic complexity, graphs, and trees. Features Designed to be especially useful for courses at the community-college level Ideal as a first- or second-year textbook for computer science majors, or as a general introduction to discrete mathematics Written to be accessible to those with a limited mathematics background, and to aid with the transition to abstract thinking Filled with over 200 worked examples, boxed for easy reference, and over 200 practice problems with answers Contains approximately 40 simple algorithms to aid students in becoming proficient with algorithm control structures and pseudocode Includes an appendix on basic circuit design which provides a real-world motivational example for computer science majors by drawing on multiple topics covered in the book to design a circuit that adds two eight-digit binary numbers Jon Pierre Fortney graduated from the University of Pennsylvania in 1996 with a BA in Mathematics and Actuarial Science and a BSE in Chemical Engineering. Prior to returning to graduate school, he worked as both an environmental engineer and as an actuarial analyst. He graduated from Arizona State University in 2008 with a PhD in Mathematics, specializing in Geometric Mechanics. Since 2012, he has worked at Zayed University in Dubai. This is his second mathematics textbook.

The Algorithmic Society - Technology, Power, and Knowledge (Hardcover): Marc Schuilenburg, Rik Peeters The Algorithmic Society - Technology, Power, and Knowledge (Hardcover)
Marc Schuilenburg, Rik Peeters
R4,131 Discovery Miles 41 310 Ships in 12 - 17 working days

We live in an algorithmic society. Algorithms have become the main mediator through which power is enacted in our society. This book brings together three academic fields - Public Administration, Criminal Justice and Urban Governance - into a single conceptual framework, and offers a broad cultural-political analysis, addressing critical and ethical issues of algorithms. Governments are increasingly turning towards algorithms to predict criminality, deliver public services, allocate resources, and calculate recidivism rates. Mind-boggling amounts of data regarding our daily actions are analysed to make decisions that manage, control, and nudge our behaviour in everyday life. The contributions in this book offer a broad analysis of the mechanisms and social implications of algorithmic governance. Reporting from the cutting edge of scientific research, the result is illuminating and useful for understanding the relations between algorithms and power.Topics covered include: Algorithmic governmentality Transparency and accountability Fairness in criminal justice and predictive policing Principles of good digital administration Artificial Intelligence (AI) in the smart city This book is essential reading for students and scholars of Sociology, Criminology, Public Administration, Political Sciences, and Cultural Theory interested in the integration of algorithms into the governance of society.

Discovering Computer Science - Interdisciplinary Problems, Principles, and Python Programming (Hardcover, 2nd edition): Jessen... Discovering Computer Science - Interdisciplinary Problems, Principles, and Python Programming (Hardcover, 2nd edition)
Jessen Havill
R5,236 Discovery Miles 52 360 Ships in 12 - 17 working days

Provides complete update and organization of the previous books, with some material moving online; Includes new problems, projects, and exercises; Includes interactive coding resources to accompany the book, including examples in the text, exercises, projects, and refection questions.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Advances in Optimization and Linear…
Ivan Stanimirovic Hardcover R3,494 Discovery Miles 34 940
Data: A Guide to Humans
Phil Harvey, Noelia Jimenez Martinez Hardcover R355 Discovery Miles 3 550
Machine Learning on Commodity Tiny…
Song Guo, Qihua Zhou Hardcover R2,165 Discovery Miles 21 650
The Garbage Collection Handbook - The…
Richard Jones, Antony Hosking, … Paperback R1,450 Discovery Miles 14 500
Problem Solving with Algorithms and Data…
Bradley N Miller, David L Ranum Paperback R1,481 Discovery Miles 14 810
How to Prove It - A Structured Approach
Daniel J. Velleman Paperback R1,117 Discovery Miles 11 170
A Practical Approach to Data Structures…
Sanjay Pahuja Hardcover R1,452 Discovery Miles 14 520
Algorithms Illuminated - Omnibus Edition
Tim Roughgarden Hardcover R1,594 Discovery Miles 15 940
The Basics of Practical Optimization
Adam B. Levy Paperback R1,887 Discovery Miles 18 870
AI for Scientific Discovery
Janna Hastings Hardcover R3,666 Discovery Miles 36 660

 

Partners