0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (6)
  • R250 - R500 (59)
  • R500+ (5,337)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > General theory of computing > Data structures

Relational Calculus for Actionable Knowledge (Hardcover, 1st ed. 2022): Michel Bares, Eloi Bosse Relational Calculus for Actionable Knowledge (Hardcover, 1st ed. 2022)
Michel Bares, Eloi Bosse
R2,698 Discovery Miles 26 980 Ships in 18 - 22 working days

This book focuses on one of the major challenges of the newly created scientific domain known as data science: turning data into actionable knowledge in order to exploit increasing data volumes and deal with their inherent complexity. Actionable knowledge has been qualitatively and intensively studied in management, business, and the social sciences but in computer science and engineering, its connection has only recently been established to data mining and its evolution, 'Knowledge Discovery and Data Mining' (KDD). Data mining seeks to extract interesting patterns from data, but, until now, the patterns discovered from data have not always been 'actionable' for decision-makers in Socio-Technical Organizations (STO). With the evolution of the Internet and connectivity, STOs have evolved into Cyber-Physical and Social Systems (CPSS) that are known to describe our world today. In such complex and dynamic environments, the conventional KDD process is insufficient, and additional processes are required to transform complex data into actionable knowledge. Readers are presented with advanced knowledge concepts and the analytics and information fusion (AIF) processes aimed at delivering actionable knowledge. The authors provide an understanding of the concept of 'relation' and its exploitation, relational calculus, as well as the formalization of specific dimensions of knowledge that achieve a semantic growth along the AIF processes. This book serves as an important technical presentation of relational calculus and its application to processing chains in order to generate actionable knowledge. It is ideal for graduate students, researchers, or industry professionals interested in decision science and knowledge engineering.

Beyond Algorithms - Delivering AI for Business (Hardcover): James,Luke, David Porter, Padmanabhan Santhanam Beyond Algorithms - Delivering AI for Business (Hardcover)
James,Luke, David Porter, Padmanabhan Santhanam
R3,949 Discovery Miles 39 490 Ships in 10 - 15 working days

Focuses on the definition, engineering, and delivery of AI solutions as opposed to AI itself Reader will still gain a strong understanding of AI, but through the perspective of delivering real solutions Explores the core AI issues that impact the success of an overall solution including i. realities of dealing with data, ii. impact of AI accuracy on the ability of the solution to meet business objectives, iii. challenges in managing the quality of machine learning models Includes real world examples of enterprise scale solutions Provides a series of (optional) technical deep dives and thought experiments.

Modern Cryptography Primer - Theoretical Foundations and Practical Applications (Hardcover, 2013 ed.): Czeslaw Koscielny,... Modern Cryptography Primer - Theoretical Foundations and Practical Applications (Hardcover, 2013 ed.)
Czeslaw Koscielny, Miroslaw Kurkowski, Marian Srebrny
R2,544 Discovery Miles 25 440 Ships in 10 - 15 working days

Cryptography has experienced rapid development, with major advances recently in both secret and public key ciphers, cryptographic hash functions, cryptographic algorithms and multiparty protocols, including their software engineering correctness verification, and various methods of cryptanalysis. This textbook introduces the reader to these areas, offering an understanding of the essential, most important, and most interesting ideas, based on the authors' teaching and research experience.

After introducing the basic mathematical and computational complexity concepts, and some historical context, including the story of Enigma, the authors explain symmetric and asymmetric cryptography, electronic signatures and hash functions, PGP systems, public key infrastructures, cryptographic protocols, and applications in network security. In each case the text presents the key technologies, algorithms, and protocols, along with methods of design and analysis, while the content is characterized by a visual style and all algorithms are presented in readable pseudocode or using simple graphics and diagrams.

The book is suitable for undergraduate and graduate courses in computer science and engineering, particularly in the area of networking, and it is also a suitable reference text for self-study by practitioners and researchers. The authors assume only basic elementary mathematical experience, the text covers the foundational mathematics and computational complexity theory.

Introduction to Cryptography - Principles and Applications (Hardcover, 3rd ed. 2015): Hans Delfs, Helmut Knebl Introduction to Cryptography - Principles and Applications (Hardcover, 3rd ed. 2015)
Hans Delfs, Helmut Knebl
R2,680 Discovery Miles 26 800 Ships in 10 - 15 working days

The first part of this book covers the key concepts of cryptography on an undergraduate level, from encryption and digital signatures to cryptographic protocols. Essential techniques are demonstrated in protocols for key exchange, user identification, electronic elections and digital cash. In the second part, more advanced topics are addressed, such as the bit security of one-way functions and computationally perfect pseudorandom bit generators. The security of cryptographic schemes is a central topic. Typical examples of provably secure encryption and signature schemes and their security proofs are given. Though particular attention is given to the mathematical foundations, no special background in mathematics is presumed. The necessary algebra, number theory and probability theory are included in the appendix. Each chapter closes with a collection of exercises. In the second edition the authors added a complete description of the AES, an extended section on cryptographic hash functions, and new sections on random oracle proofs and public-key encryption schemes that are provably secure against adaptively-chosen-ciphertext attacks. The third edition is a further substantive extension, with new topics added, including: elliptic curve cryptography; Paillier encryption; quantum cryptography; the new SHA-3 standard for cryptographic hash functions; a considerably extended section on electronic elections and Internet voting; mix nets; and zero-knowledge proofs of shuffles. The book is appropriate for undergraduate and graduate students in computer science, mathematics, and engineering.

Tensor Eigenvalues and Their Applications (Hardcover, 1st ed. 2018): Liqun Qi, Haibin Chen, Yannan Chen Tensor Eigenvalues and Their Applications (Hardcover, 1st ed. 2018)
Liqun Qi, Haibin Chen, Yannan Chen
R4,000 Discovery Miles 40 000 Ships in 10 - 15 working days

This book offers an introduction to applications prompted by tensor analysis, especially by the spectral tensor theory developed in recent years. It covers applications of tensor eigenvalues in multilinear systems, exponential data fitting, tensor complementarity problems, and tensor eigenvalue complementarity problems. It also addresses higher-order diffusion tensor imaging, third-order symmetric and traceless tensors in liquid crystals, piezoelectric tensors, strong ellipticity for elasticity tensors, and higher-order tensors in quantum physics. This book is a valuable reference resource for researchers and graduate students who are interested in applications of tensor eigenvalues.

Metaheuristic Computation with MATLAB (R) (Paperback): Erik Cuevas, Alma Rodriguez Metaheuristic Computation with MATLAB (R) (Paperback)
Erik Cuevas, Alma Rodriguez
R1,445 Discovery Miles 14 450 Ships in 10 - 15 working days

Metaheuristic algorithms are considered as generic optimization tools that can solve very complex problems characterized by having very large search spaces. Metaheuristic methods reduce the effective size of the search space through the use of effective search strategies. Book Features: Provides a unified view of the most popular metaheuristic methods currently in use Includes the necessary concepts to enable readers to implement and modify already known metaheuristic methods to solve problems Covers design aspects and implementation in MATLAB (R) Contains numerous examples of problems and solutions that demonstrate the power of these methods of optimization The material has been written from a teaching perspective and, for this reason, this book is primarily intended for undergraduate and postgraduate students of artificial intelligence, metaheuristic methods, and/or evolutionary computation. The objective is to bridge the gap between metaheuristic techniques and complex optimization problems that profit from the convenient properties of metaheuristic approaches. Therefore, engineer practitioners who are not familiar with metaheuristic computation will appreciate that the techniques discussed are beyond simple theoretical tools, since they have been adapted to solve significant problems that commonly arise in such areas.

Algorithms and Order (Hardcover, 1989 ed.): Ivan Rival Algorithms and Order (Hardcover, 1989 ed.)
Ivan Rival
R10,376 Discovery Miles 103 760 Ships in 18 - 22 working days

This volume contains the texts of the principal survey papers presented at ALGORITHMS -and ORDER, held. at Ottawa, Canada from June 1 to June 12, 1987. The conference was supported by grants from the N.A.T.O. Advanced Study Institute programme, the University of Ottawa, and the Natural Sciences and Engineering Research Council of Canada. We are grateful for this considerable support. Over fifty years ago, the Symposium on Lattice Theory, in Charlottesville, U.S.A., proclaimed the vitality of ordered sets. Only twenty years later the Symposium on Partially Ordered Sets and Lattice Theory, held at Monterey, U.S.A., had solved many of the problems that had been originally posed. In 1981, the Symposium on Ordered Sets held at Banff, Canada, continued this tradition. It was marked by a landmark volume containing twenty-three articles on almost all current topics in the theory of ordered sets and its applications. Three years after, Graphs and Orders, also held at Banff, Canada, aimed to document the role of graphs in the theory of ordered sets and its applications. Because of its special place in the landscape of the mathematical sciences order is especially sensitive to new trends and developments. Today, the most important current in the theory and application of order springs from theoretical computer seience. Two themes of computer science lead the way. The first is data structure. Order is common to data structures."

Swarm Intelligence - Foundation, Principles, and Engineering Applications (Hardcover): Abhishek Sharma, Abhinav Sharma,... Swarm Intelligence - Foundation, Principles, and Engineering Applications (Hardcover)
Abhishek Sharma, Abhinav Sharma, Jitendra Kumar Pandey, Mangey Ram
R2,644 Discovery Miles 26 440 Ships in 10 - 15 working days

Provides a comprehensive review on new swarm intelligence Offers practical implementation of PSO with MATLAB code Presents statistical analysis techniques so that researchers can analyze their own experiment design Discusses swarm intelligence algorithms in social sector and oil and gas industries Covers recent findings and the implementation techniques to Machine Learning

Code Breaking in the Pacific (Hardcover, 2014 ed.): Peter Donovan, John Mack Code Breaking in the Pacific (Hardcover, 2014 ed.)
Peter Donovan, John Mack
R4,008 Discovery Miles 40 080 Ships in 10 - 15 working days

This book reveals the historical context and the evolution of the technically complex Allied Signals Intelligence (Sigint) activity against Japan from 1920 to 1945. It traces the all-important genesis and development of the cryptanalytic techniques used to break the main Japanese Navy code (JN-25) and the Japanese Army s Water Transport Code during WWII. This is the first book to describe, explain and analyze the code breaking techniques developed and used to provide this intelligence, thus closing the sole remaining gap in the published accounts of the Pacific War. The authors also explore the organization of cryptographic teams and issues of security, censorship, and leaks. Correcting gaps in previous research, this book illustrates how Sigint remained crucial to Allied planning throughout the war. It helped direct the advance to the Philippines from New Guinea, the sea battles and the submarine onslaught on merchant shipping. Written by well-known authorities on the history of cryptography and mathematics, Code Breaking in the Pacific is designed for cryptologists, mathematicians and researchers working in communications security. Advanced-level students interested in cryptology, the history of the Pacific War, mathematics or the history of computing will also find this book a valuable resource."

Algorithms and Subjectivity - The Subversion of Critical Knowledge (Hardcover): Eran Fisher Algorithms and Subjectivity - The Subversion of Critical Knowledge (Hardcover)
Eran Fisher
R1,577 Discovery Miles 15 770 Ships in 10 - 15 working days

This book is a unique and note-worthy enquiry into the implications of algorithmic knowledge for human subjectivity Eran Fisher provides timely insight on a relevant field of research, i.e., how algorithms impact our society This book will make a timely contribution to the social study of algorithms and will prove especially valuable for scholars working at the intersections of media and communication studies, internet studies, information studies, the sociology of technology, the philosophy of technology, and science and technology studies

Blockchain Technology - Exploring Opportunities, Challenges, and Applications (Paperback): Sonali Vyas, Vinod Kumar Shukla,... Blockchain Technology - Exploring Opportunities, Challenges, and Applications (Paperback)
Sonali Vyas, Vinod Kumar Shukla, Shaurya Gupta, Ajay Prasad
R2,004 Discovery Miles 20 040 Ships in 10 - 15 working days

This book is for anyone who wants to gain an understanding of Blockchain technology and its potential. The book is research-oriented and covers different verticals of Blockchain technology. It discusses the characteristics and features of Blockchain, includes techniques, challenges, and future trends, along with case studies for deeper understanding. Blockchain Technology: Exploring Opportunities, Challenges, and Applications covers the core concepts related to Blockchain technology starting from scratch. The algorithms, concepts, and application areas are discussed according to current market trends and industry needs. It presents different application areas of industry and academia and discusses the characteristics and features of this technology. It also explores the challenges and future trends and provides an understanding of new opportunities. This book is for anyone at the beginner to intermediate level that wants to learn about the core concepts related to Blockchain technology.

Mining Complex Networks (Hardcover): Bogumil Kaminski, Pawel Pralat, Francois Theberge Mining Complex Networks (Hardcover)
Bogumil Kaminski, Pawel Pralat, Francois Theberge
R2,658 Discovery Miles 26 580 Ships in 10 - 15 working days

This book concentrates on mining networks, a subfield within data science. Data science uses scientific and computational tools to extract valuable knowledge from large data sets. Once data is processed and cleaned, it is analyzed and presented to support decision-making processes. Data science and machine learning tools have become widely used in companies of all sizes. Networks are often large-scale, decentralized, and evolve dynamically over time. Mining complex networks aim to understand the principles governing the organization and the behavior of such networks is crucial for a broad range of fields of study. Here are a few selected typical applications of mining networks: Community detection (which users on some social media platforms are close friends). Link prediction (who is likely to connect to whom on such platforms). Node attribute prediction (what advertisement should be shown to a given user of a particular platform to match their interests). Influential node detection (which social media users would be the best ambassadors of a specific product). This textbook is suitable for an upper-year undergraduate course or a graduate course in programs such as data science, mathematics, computer science, business, engineering, physics, statistics, and social science. This book can be successfully used by all enthusiasts of data science at various levels of sophistication to expand their knowledge or consider changing their career path. Jupiter notebooks (in Python and Julia) accompany the book and can be accessed on https://www.ryerson.ca/mining-complex-networks/. These not only contain all the experiments presented in the book, but also include additional material. Bogumil Kaminski is the Chairman of the Scientific Council for the Discipline of Economics and Finance at SGH Warsaw School of Economics. He is also an Adjunct Professor at the Data Science Laboratory at Ryerson University. Bogumil is an expert in applications of mathematical modeling to solving complex real-life problems. He is also a substantial open-source contributor to the development of the Julia language and its package ecosystem. Pawel Pralat is a Professor of Mathematics in Ryerson University, whose main research interests are in random graph theory, especially in modeling and mining complex networks. He is the Director of Fields-CQAM Lab on Computational Methods in Industrial Mathematics in The Fields Institute for Research in Mathematical Sciences and has pursued collaborations with various industry partners as well as the Government of Canada. He has written over 170 papers and three books with 130 plus collaborators. Francois Theberge holds a B.Sc. degree in applied mathematics from the University of Ottawa, a M.Sc. in telecommunications from INRS and a PhD in electrical engineering from McGill University. He has been employed by the Government of Canada since 1996 where he was involved in the creation of the data science team as well as the research group now known as the Tutte Institute for Mathematics and Computing. He also holds an adjunct professorial position in the Department of Mathematics and Statistics at the University of Ottawa. His current interests include relational-data mining and deep learning.

Optimization Techniques in Computer Vision - Ill-Posed Problems and Regularization (Hardcover, 1st ed. 2016): Mongi A. Abidi,... Optimization Techniques in Computer Vision - Ill-Posed Problems and Regularization (Hardcover, 1st ed. 2016)
Mongi A. Abidi, Andrei V. Gribok, Joonki Paik
R4,060 Discovery Miles 40 600 Ships in 10 - 15 working days

This book presents practical optimization techniques used in image processing and computer vision problems. Ill-posed problems are introduced and used as examples to show how each type of problem is related to typical image processing and computer vision problems. Unconstrained optimization gives the best solution based on numerical minimization of a single, scalar-valued objective function or cost function. Unconstrained optimization problems have been intensively studied, and many algorithms and tools have been developed to solve them. Most practical optimization problems, however, arise with a set of constraints. Typical examples of constraints include: (i) pre-specified pixel intensity range, (ii) smoothness or correlation with neighboring information, (iii) existence on a certain contour of lines or curves, and (iv) given statistical or spectral characteristics of the solution. Regularized optimization is a special method used to solve a class of constrained optimization problems. The term regularization refers to the transformation of an objective function with constraints into a different objective function, automatically reflecting constraints in the unconstrained minimization process. Because of its simplicity and efficiency, regularized optimization has many application areas, such as image restoration, image reconstruction, optical flow estimation, etc. Optimization plays a major role in a wide variety of theories for image processing and computer vision. Various optimization techniques are used at different levels for these problems, and this volume summarizes and explains these techniques as applied to image processing and computer vision.

Deep Learning in Practice (Hardcover): Mehdi Ghayoumi Deep Learning in Practice (Hardcover)
Mehdi Ghayoumi
R2,342 Discovery Miles 23 420 Ships in 10 - 15 working days

Covers deep learning fundamentals; Focuses on applications; Covers human emotion analysis and deep learning; Explains how to use web based techniques for deep learning applications; Includes coverage of autonomous vehicles and deep learning

Advanced Applications of Computational Mathematics (Hardcover): Akshay Kumar, Mangey Ram, Hari Mohan Srivastava Advanced Applications of Computational Mathematics (Hardcover)
Akshay Kumar, Mangey Ram, Hari Mohan Srivastava
R3,080 Discovery Miles 30 800 Ships in 10 - 15 working days

This book "Advanced Applications of Computational Mathematics" covers multidisciplinary studies containing advanced research in the field of computational and applied mathematics. The book includes research methodology, techniques, applications, and algorithms. The book will be very useful to advanced students, researchers and practitioners who are involved in the areas of computational and applied mathematics and engineering.

Swarm Intelligence for Iris Recognition (Hardcover): Zaheera Zainal Abidin Swarm Intelligence for Iris Recognition (Hardcover)
Zaheera Zainal Abidin
R1,569 Discovery Miles 15 690 Ships in 10 - 15 working days

Presents original method of enhanced ant colony optimization in feature selection, based on mathematical experiments and modelling. Provides a theoretical concept in iris features searching and detection as part of feature extraction process. Demonstrates the iris features selection and detection using the proposed design methodology with enhanced ant colony optimization for iris recognition.

Data Structures using C - A Practical Approach for Beginners (Hardcover): Amol M. Jagtap, Ajit S. Mali Data Structures using C - A Practical Approach for Beginners (Hardcover)
Amol M. Jagtap, Ajit S. Mali
R3,372 Discovery Miles 33 720 Ships in 10 - 15 working days

Resolves linear and non-linear data structures in C language using the algorithm, diagrammatically and its time and space complexity analysis. Covers interview questions and MCQs on all topics of campus readiness Identifies possible solutions to each problem. Includes real life and computational applications of linear and non-linear data structures

Nature-Inspired Computation in Navigation and Routing Problems - Algorithms, Methods and Applications (Hardcover, 1st ed.... Nature-Inspired Computation in Navigation and Routing Problems - Algorithms, Methods and Applications (Hardcover, 1st ed. 2020)
Xin-She Yang, Yuxin Zhao
R2,666 Discovery Miles 26 660 Ships in 18 - 22 working days

This book discusses all the major nature-inspired algorithms with a focus on their application in the context of solving navigation and routing problems. It also reviews the approximation methods and recent nature-inspired approaches for practical navigation, and compares these methods with traditional algorithms to validate the approach for the case studies discussed. Further, it examines the design of alternative solutions using nature-inspired techniques, and explores the challenges of navigation and routing problems and nature-inspired metaheuristic approaches.

Advanced DPA Theory and Practice - Towards the Security Limits of Secure Embedded Circuits (Hardcover, 2013 ed.): Eric Peeters Advanced DPA Theory and Practice - Towards the Security Limits of Secure Embedded Circuits (Hardcover, 2013 ed.)
Eric Peeters
R3,225 Discovery Miles 32 250 Ships in 18 - 22 working days

Advanced DPA Theory and Practice provides a thorough survey of new physical leakages of embedded systems, namely the power and the electromagnetic emanations. The book presents a thorough analysis about leakage origin of embedded system. This book examines the systematic approach of the different aspects and advanced details about experimental setup for electromagnetic attack. The author discusses advanced statistical methods to successfully attack embedded devices such as high-order attack, template attack in principal subspaces, machine learning methods. The book includes theoretical framework to define side-channel based on two metrics: mutual information and success rate.

Crypto-Finance, Law and Regulation - Governing an Emerging Ecosystem (Hardcover): Joseph Lee Crypto-Finance, Law and Regulation - Governing an Emerging Ecosystem (Hardcover)
Joseph Lee
R4,213 Discovery Miles 42 130 Ships in 10 - 15 working days

Crypto-Finance, Law and Regulation investigates whether crypto-finance will cause a paradigm shift in regulation from a centralised model to a model based on distributed consensus. This book explores the emergence of a decentralised and disintermediated crypto-market and investigates the way in which it can transform the financial markets. It examines three components of the financial market - technology, finance, and the law - and shows how their interrelationship dictates the structure of a crypto-market. It focuses on regulators' enforcement policies and their jurisdiction over crypto-finance operators and participants. The book also discusses the latest developments in crypto-finance, and the advantages and disadvantages of crypto-currency as an alternative payment product. It also investigates how such a decentralised crypto-finance system can provide access to finance, promote a shared economy, and allow access to justice. By exploring the law, regulation and governance of crypto-finance from a national, regional and global viewpoint, the book provides a fascinating and comprehensive overview of this important topic and will appeal to students, scholars and practitioners interested in regulation, finance and the law.

Blockchain Technology - Exploring Opportunities, Challenges, and Applications (Hardcover): Sonali Vyas, Vinod Kumar Shukla,... Blockchain Technology - Exploring Opportunities, Challenges, and Applications (Hardcover)
Sonali Vyas, Vinod Kumar Shukla, Shaurya Gupta, Ajay Prasad
R5,213 Discovery Miles 52 130 Ships in 10 - 15 working days

This book is for anyone who wants to gain an understanding of Blockchain technology and its potential. The book is research-oriented and covers different verticals of Blockchain technology. It discusses the characteristics and features of Blockchain, includes techniques, challenges, and future trends, along with case studies for deeper understanding. Blockchain Technology: Exploring Opportunities, Challenges, and Applications covers the core concepts related to Blockchain technology starting from scratch. The algorithms, concepts, and application areas are discussed according to current market trends and industry needs. It presents different application areas of industry and academia and discusses the characteristics and features of this technology. It also explores the challenges and future trends and provides an understanding of new opportunities. This book is for anyone at the beginner to intermediate level that wants to learn about the core concepts related to Blockchain technology.

An Integrated Approach to Home Security and Safety Systems (Hardcover): Sonali Goyal, Neera Batra, N. K. Batra An Integrated Approach to Home Security and Safety Systems (Hardcover)
Sonali Goyal, Neera Batra, N. K. Batra
R3,355 Discovery Miles 33 550 Ships in 10 - 15 working days

This book provides an integrated solution for security and safety in the home, covering both assistance in health monitoring and safety from strangers/intruders who want to enter the home with harmful intentions. It defines a system whereby recognition of a person/stranger at the door is done using three modules: Face Recognition, Voice Recognition and Similarity Index. These three modules are taken together to provide a percentage likelihood that the individual is in the "known" or "unknown" category. The system can also continuously monitor the health parameters of a vulnerable person living alone at home and aid them in calling for help in an emergency. The authors have analyzed a number of existing biometric techniques to provide security for an individual living alone at home. These biometric techniques have been tested using MATLAB (R) image processing and signal processing toolboxes, and results have been calculated on the basis of recognition rate. A major contribution in providing security is a hybrid algorithm proposed by the author named PICA, which combines features of both PCA (Principle Component Analysis) and ICA (Independent Component Analysis) algorithms. This hybrid approach gives better performance recognition than either system alone. The second proposed hybrid algorithm for voice recognition is named as a MFRASTA algorithm by combining features of MFCC (Mel Frequency Cepstral Coefficient) and RASTA-PLP (RelAtive SpecTrA-Perceptual Linear Prediction) algorithm. After performing experiments, results are collected on the basis of recognition rate. The authors have also proposed a third technique named as a Similarity Index to provide trust-based security for an individual. This technique is text independent in which a person is recognized by pronunciation, frequency, tone, pitch, etc., irrespective of the content spoken by the person. By combining these three techniques, a high recognition rate is provided to the person at the door and high security to the individual living independently at home. In the final contribution, the authors have proposed a fingertip-based application for health monitoring by using the concept of sensors. This application is developed using iPhone 6's camera. When a person puts their fingertip on a camera lens, with the help of brightness of the skin, the person's heartbeat will be monitored. This is possible even with a low-quality camera. In case of any emergency, text messages will be sent to the family members of the individual living alone by using 3G Dongle and MATLAB tool. Results show that the proposed work outperforms all the existing techniques used in face recognition, voice recognition, and health monitoring alone.

Intelligent System Algorithms and Applications in Science and Technology (Hardcover): Sunil Pathak, Pramod Kumar Bhatt, Sanjay... Intelligent System Algorithms and Applications in Science and Technology (Hardcover)
Sunil Pathak, Pramod Kumar Bhatt, Sanjay Kumar Singh, Ashutosh Tripathi, Pankaj Kumar Pandey
R4,050 Discovery Miles 40 500 Ships in 10 - 15 working days

The volume addresses a selection of diverse topics in such areas as: machine learning based intelligent systems for healthcare applications of artificial intelligence the Internet of Things, intelligent data analytics techniques, intelligent network systems and applications, and inequalities and process control systems.

Evolutionary Optimization Algorithms (Hardcover): Altaf Q. H. Badar Evolutionary Optimization Algorithms (Hardcover)
Altaf Q. H. Badar
R3,375 Discovery Miles 33 750 Ships in 10 - 15 working days

This comprehensive reference text discusses evolutionary optimization techniques, to find optimal solutions for single and multi-objective problems. The text presents each evolutionary optimization algorithm along with its history and other working equations. It also discusses variants and hybrids of optimization techniques. The text presents step-by-step solution to a problem and includes software's like MATLAB and Python for solving optimization problems. It covers important optimization algorithms including single objective optimization, multi objective optimization, Heuristic optimization techniques, shuffled frog leaping algorithm, bacteria foraging algorithm and firefly algorithm. Aimed at senior undergraduate and graduate students in the field of electrical engineering, electronics engineering, mechanical engineering, and computer science and engineering, this text: Provides step-by-step solution for each evolutionary optimization algorithm. Provides flowcharts and graphics for better understanding of optimization techniques. Discusses popular optimization techniques include particle swarm optimization and genetic algorithm. Presents every optimization technique along with the history and working equations. Includes latest software like Python and MATLAB.

Guide to FPGA Implementation of Arithmetic Functions (Hardcover, 2012): Jean-Pierre Deschamps, Gustavo D. Sutter, Enrique Canto Guide to FPGA Implementation of Arithmetic Functions (Hardcover, 2012)
Jean-Pierre Deschamps, Gustavo D. Sutter, Enrique Canto
R5,902 Discovery Miles 59 020 Ships in 18 - 22 working days

This book is designed both for FPGA users interested in developing new, specific components - generally for reducing execution times -and IP core designers interested in extending their catalog of specific components. The main focus is circuit synthesis and the discussion shows, for example, how a given algorithm executing some complex function can be translated to a synthesizable circuit description, as well as which are the best choices the designer can make to reduce the circuit cost, latency, or power consumption. This is not a book on algorithms. It is a book that shows how to translate efficiently an algorithm to a circuit, using techniques such as parallelism, pipeline, loop unrolling, and others. Numerous examples of FPGA implementation are described throughout this book and the circuits are modeled in VHDL. Complete and synthesizable source files are available for download."

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Application of Ant Colony…
Ali Soofastaei Hardcover R2,553 Discovery Miles 25 530
Comprehensive Metaheuristics…
S. Ali Mirjalili, Amir Hossein Gandomi Paperback R3,956 Discovery Miles 39 560
Introduction to Chemical Engineering…
Henry C. Foley Paperback R3,120 Discovery Miles 31 200
MATLAB Applications in Engineering
Constantin Volosencu Hardcover R3,055 Discovery Miles 30 550
C Programming - C Programming Language…
Adam Dodson Hardcover R551 R505 Discovery Miles 5 050
Python Programming for Computations…
Computer Language Hardcover R1,120 R949 Discovery Miles 9 490
Gamma Solution - An Application of…
James R Warren Hardcover R1,232 R1,048 Discovery Miles 10 480
Coding for Kids in Python - Python…
Bob Mather Hardcover R851 Discovery Miles 8 510
Hybrid Algorithms for Service, Computing…
Jairo R Montoya-Torres, Angel A Juan, … Hardcover R4,583 Discovery Miles 45 830
Computational and Statistical Methods…
Shen Liu, James McGree, … Hardcover R1,802 Discovery Miles 18 020

 

Partners