0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (5)
  • R250 - R500 (51)
  • R500+ (5,313)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > General theory of computing > Data structures

Applied Evolutionary Algorithms for Engineers using Python (Hardcover): Leonardo Azevedo Scardua Applied Evolutionary Algorithms for Engineers using Python (Hardcover)
Leonardo Azevedo Scardua
R4,918 Discovery Miles 49 180 Ships in 10 - 15 working days

This book meant for those who seek to apply evolutionary algorithms to problems in engineering and science. To this end, it provides the theoretical background necessary to the understanding of the presented evolutionary algorithms and their shortcomings, while also discussing themes that are pivotal to the successful application of evolutionary algorithms to real-world problems. The theoretical descriptions are illustrated with didactical Python implementations of the algorithms, which not only allow readers to consolidate their understanding, but also provide a sound starting point for those intending to apply evolutionary algorithms to optimization problems in their working fields. Python has been chosen due to its widespread adoption in the Artificial Intelligence community. Those familiar with high level languages such as MATLAB (TM) will not have any difficulty in reading the Python implementations of the evolutionary algorithms provided in the book. Instead of attempting to encompass most of the existing evolutionary algorithms, past and present, the book focuses on those algorithms that researchers have recently applied to difficult optimization problems, such as control problems with continuous action spaces and the training of high-dimensional convolutional neural-networks. The basic characteristics of real-world optimization problems are presented, together with recommendations on its proper application to evolutionary algorithms. The applied nature of the book is reinforced by the presentation of successful cases of the application of evolutionary algorithms to optimization problems. This is complemented by Python source codes, giving users an insight into the idiosyncrasies of the practical application of evolutionary algorithms.

Recommender Systems - Algorithms and Applications (Hardcover): S. Vairachilai, Sirisha Potluri, P. Pavan Kumar, Sachi Nandan... Recommender Systems - Algorithms and Applications (Hardcover)
S. Vairachilai, Sirisha Potluri, P. Pavan Kumar, Sachi Nandan Mohanty
R3,393 Discovery Miles 33 930 Ships in 10 - 15 working days

Recommender systems use information filtering to predict user preferences. They are becoming a vital part of e-business and are used in a wide variety of industries, ranging from entertainment and social networking to information technology, tourism, education, agriculture, healthcare, manufacturing, and retail. Recommender Systems: Algorithms and Applications dives into the theoretical underpinnings of these systems and looks at how this theory is applied and implemented in actual systems. The book examines several classes of recommendation algorithms, including Machine learning algorithms Community detection algorithms Filtering algorithms Various efficient and robust product recommender systems using machine learning algorithms are helpful in filtering and exploring unseen data by users for better prediction and extrapolation of decisions. These are providing a wider range of solutions to such challenges as imbalanced data set problems, cold-start problems, and long tail problems. This book also looks at fundamental ontological positions that form the foundations of recommender systems and explain why certain recommendations are predicted over others. Techniques and approaches for developing recommender systems are also investigated. These can help with implementing algorithms as systems and include A latent-factor technique for model-based filtering systems Collaborative filtering approaches Content-based approaches Finally, this book examines actual systems for social networking, recommending consumer products, and predicting risk in software engineering projects.

IP Routing Protocols - Fundamentals and Distance-Vector Routing Protocols (Paperback): James Aweya IP Routing Protocols - Fundamentals and Distance-Vector Routing Protocols (Paperback)
James Aweya
R2,287 Discovery Miles 22 870 Ships in 10 - 15 working days

This book focuses on the fundamental concepts of IP routing and distance-vector routing protocols (RIPv2 and EIGRP). It discusses routing protocols from a practicing engineer's perspective, linking theory and fundamental concepts to common practices and everyday examples. The book benefits and reflects the author's more than 22 years of designing and working with IP routing devices and protocols (and Telecoms systems, in general). Every aspect of the book is written to reflect current best practices using real-world examples. This book describes the various methods used by routers to learn routing information. The author includes discussion of the characteristics of the different dynamic routing protocols, and how they differ in design and operation. He explains the processing steps involved in forwarding IP packets through an IP router to their destination and discusses the various mechanisms IP routers use for controlling routing in networks. The discussion is presented in a simple style to make it comprehensible and appealing to undergraduate and graduate level students, research and practicing engineers, scientists, IT personnel, and network engineers. It is geared toward readers who want to understand the concepts and theory of IP routing protocols, through real-world example systems and networks. Focuses on the fundamental concepts of IP routing and distance-vector routing protocols (RIPv2 and EIGRP). Describes the various methods used by routers to learn routing information. Includes discussion of the characteristics of the different dynamic routing protocols, and how they differ in design and operation. Provides detailed descriptions of the most common distance-vector routing protocols RIPv2 and EIGRP. Discusses the various mechanisms IP routers use for controlling routing in networks. James Aweya, PhD, is a chief research scientist at the Etisalat British Telecom Innovation Center (EBTIC), Khalifa University, Abu Dhabi, UAE. He has authored four books including this book and is a senior member of the Institute of Electrical and Electronics Engineers (IEEE).

IP Routing Protocols - Link-State and Path-Vector Routing Protocols (Paperback): James Aweya IP Routing Protocols - Link-State and Path-Vector Routing Protocols (Paperback)
James Aweya
R2,300 Discovery Miles 23 000 Ships in 10 - 15 working days

This book discusses link-state routing protocols (OSPF and IS-IS), and the path-vector routing protocol (BGP). It covers their most identifying characteristics, operations, and the databases they maintain. Material is presented from a practicing engineer's perspective, linking theory and fundamental concepts to common practices and real-world examples. Every aspect of the book is written to reflect current best practices using real-world examples. The book begins with a detailed description of the OSPF area types and hierarchical routing, and the different types of routers used in an OSPF autonomous system. The author goes on to describe in detail the different OSPF packet types, and inbound and outbound processing of OSPF link-state advertisements (LSAs). Next, the book gives an overview of the main features of IS-IS. The author then discusses the two-level routing hierarchy for controlling the distribution of intra-domain (Level 1) and inter-domain (Level 2) routing information within an IS-IS routing domain. He then describes in detail IS-IS network address formats, IS-IS routing metrics, IS-IS packet types, IS-IS network types and adjacency formation, IS-IS LSDB and synchronization, and IS-IS authentication. The book then reviews the main concepts of path-vector routing protocols, and describes BGP packet types, BGP session states and Finite State Machine, BGP path attributes types, and BGP Autonomous System Numbers (ASNs). Focuses solely on link-state routing protocols (OSPF and IS-IS), and the only path-vector routing protocol in use today (BGP). Reviews the basic concepts underlying the design of IS-IS and provides a detailed description of IS-IS area types and hierarchical routing, and the different types of routers used by IS-IS. Discusses the two-level routing hierarchy for controlling the distribution of intra-domain (Level 1) and inter-domain (Level 2) routing information within an IS-IS routing domain. Describes in detail BGP packet types, BGP session states and Finite State Machine, BGP path attributes types, and BGP ASNs, includes a high-level view of the typical BGP router and its components, and inbound and outbound message processing. James Aweya, PhD, is a chief research scientist at the Etisalat British Telecom Innovation Center (EBTIC), Khalifa University, Abu Dhabi, UAE. He has authored four books including this book and is a senior member of the Institute of Electrical and Electronics Engineers (IEEE).

IP Routing Protocols - Link-State and Path-Vector Routing Protocols (Hardcover): James Aweya IP Routing Protocols - Link-State and Path-Vector Routing Protocols (Hardcover)
James Aweya
R5,498 Discovery Miles 54 980 Ships in 10 - 15 working days

This book discusses link-state routing protocols (OSPF and IS-IS), and the path-vector routing protocol (BGP). It covers their most identifying characteristics, operations, and the databases they maintain. Material is presented from a practicing engineer's perspective, linking theory and fundamental concepts to common practices and real-world examples. Every aspect of the book is written to reflect current best practices using real-world examples. The book begins with a detailed description of the OSPF area types and hierarchical routing, and the different types of routers used in an OSPF autonomous system. The author goes on to describe in detail the different OSPF packet types, and inbound and outbound processing of OSPF link-state advertisements (LSAs). Next, the book gives an overview of the main features of IS-IS. The author then discusses the two-level routing hierarchy for controlling the distribution of intra-domain (Level 1) and inter-domain (Level 2) routing information within an IS-IS routing domain. He then describes in detail IS-IS network address formats, IS-IS routing metrics, IS-IS packet types, IS-IS network types and adjacency formation, IS-IS LSDB and synchronization, and IS-IS authentication. The book then reviews the main concepts of path-vector routing protocols, and describes BGP packet types, BGP session states and Finite State Machine, BGP path attributes types, and BGP Autonomous System Numbers (ASNs). Focuses solely on link-state routing protocols (OSPF and IS-IS), and the only path-vector routing protocol in use today (BGP). Reviews the basic concepts underlying the design of IS-IS and provides a detailed description of IS-IS area types and hierarchical routing, and the different types of routers used by IS-IS. Discusses the two-level routing hierarchy for controlling the distribution of intra-domain (Level 1) and inter-domain (Level 2) routing information within an IS-IS routing domain. Describes in detail BGP packet types, BGP session states and Finite State Machine, BGP path attributes types, and BGP ASNs, includes a high-level view of the typical BGP router and its components, and inbound and outbound message processing. James Aweya, PhD, is a chief research scientist at the Etisalat British Telecom Innovation Center (EBTIC), Khalifa University, Abu Dhabi, UAE. He has authored four books including this book and is a senior member of the Institute of Electrical and Electronics Engineers (IEEE).

IP Routing Protocols - Fundamentals and Distance-Vector Routing Protocols (Hardcover): James Aweya IP Routing Protocols - Fundamentals and Distance-Vector Routing Protocols (Hardcover)
James Aweya
R5,486 Discovery Miles 54 860 Ships in 10 - 15 working days

This book focuses on the fundamental concepts of IP routing and distance-vector routing protocols (RIPv2 and EIGRP). It discusses routing protocols from a practicing engineer's perspective, linking theory and fundamental concepts to common practices and everyday examples. The book benefits and reflects the author's more than 22 years of designing and working with IP routing devices and protocols (and Telecoms systems, in general). Every aspect of the book is written to reflect current best practices using real-world examples. This book describes the various methods used by routers to learn routing information. The author includes discussion of the characteristics of the different dynamic routing protocols, and how they differ in design and operation. He explains the processing steps involved in forwarding IP packets through an IP router to their destination and discusses the various mechanisms IP routers use for controlling routing in networks. The discussion is presented in a simple style to make it comprehensible and appealing to undergraduate and graduate level students, research and practicing engineers, scientists, IT personnel, and network engineers. It is geared toward readers who want to understand the concepts and theory of IP routing protocols, through real-world example systems and networks. Focuses on the fundamental concepts of IP routing and distance-vector routing protocols (RIPv2 and EIGRP). Describes the various methods used by routers to learn routing information. Includes discussion of the characteristics of the different dynamic routing protocols, and how they differ in design and operation. Provides detailed descriptions of the most common distance-vector routing protocols RIPv2 and EIGRP. Discusses the various mechanisms IP routers use for controlling routing in networks. James Aweya, PhD, is a chief research scientist at the Etisalat British Telecom Innovation Center (EBTIC), Khalifa University, Abu Dhabi, UAE. He has authored four books including this book and is a senior member of the Institute of Electrical and Electronics Engineers (IEEE).

How to Solve it - Modern Heuristics, Second Edition (Hardcover, 2nd ed. 2004): Zbigniew Michalewicz, David B Fogel How to Solve it - Modern Heuristics, Second Edition (Hardcover, 2nd ed. 2004)
Zbigniew Michalewicz, David B Fogel
R2,518 Discovery Miles 25 180 Ships in 18 - 22 working days

No pleasure lasts long unless there is variety in it. Publilius Syrus, Moral Sayings We've been very fortunate to receive fantastic feedback from our readers during the last four years, since the first edition of How to Solve It: Modern Heuristics was published in 1999. It's heartening to know that so many people appreciated the book and, even more importantly, were using the book to help them solve their problems. One professor, who published a review of the book, said that his students had given the best course reviews he'd seen in 15 years when using our text. There can be hardly any better praise, except to add that one of the book reviews published in a SIAM journal received the best review award as well. We greatly appreciate your kind words and personal comments that you sent, including the few cases where you found some typographical or other errors. Thank you all for this wonderful support.

Algorithms, Automation, and News - New Directions in the Study of Computation and Journalism (Hardcover): Neil Thurman, Seth C.... Algorithms, Automation, and News - New Directions in the Study of Computation and Journalism (Hardcover)
Neil Thurman, Seth C. Lewis, Jessica Kunert
R4,497 Discovery Miles 44 970 Ships in 10 - 15 working days

This book examines the growing importance of algorithms and automation-including emerging forms of artificial intelligence-in the gathering, composition, and distribution of news. In it the authors connect a long line of research on journalism and computation with scholarly and professional terrain yet to be explored. Taken as a whole, these chapters share some of the noble ambitions of the pioneering publications on 'reporting algorithms', such as a desire to see computing help journalists in their watchdog role by holding power to account. However, they also go further, firstly by addressing the fuller range of technologies that computational journalism now consists of: from chatbots and recommender systems to artificial intelligence and atomised journalism. Secondly, they advance the literature by demonstrating the increased variety of uses for these technologies, including engaging underserved audiences, selling subscriptions, and recombining and re-using content. Thirdly, they problematise computational journalism by, for example, pointing out some of the challenges inherent in applying artificial intelligence to investigative journalism and in trying to preserve public service values. Fourthly, they offer suggestions for future research and practice, including by presenting a framework for developing democratic news recommenders and another that may help us think about computational journalism in a more integrated, structured manner. The chapters in this book were originally published as a special issue of Digital Journalism.

Transportation Networks - A Quantitative Treatment (Hardcover): D. Teodorovic Transportation Networks - A Quantitative Treatment (Hardcover)
D. Teodorovic
R2,946 Discovery Miles 29 460 Ships in 10 - 15 working days

Originally published in 1986 and a major contribution towards improving operations within transportation systems, this book provides detailed coverage of the theory of transportation networks as a general traffic and transportation discipline. It examines some of the daily difficulties encountered by traffic and transportation experts, uncovering the intricacies of vehicle routing and scheduling, crew planning and facilities placement. This problem-solving approach uses multiple numerical examples and simple mathematical methods to enable newcomers to apply the book's solutions to the situations they encounter on the job.

Hidden Markov Models - Theory and Implementation using MATLAB (R) (Paperback): Joao Paulo Coelho, Tatiana M. Pinho, Jose... Hidden Markov Models - Theory and Implementation using MATLAB (R) (Paperback)
Joao Paulo Coelho, Tatiana M. Pinho, Jose Boaventura-Cunha
R1,615 Discovery Miles 16 150 Ships in 10 - 15 working days

This book presents, in an integrated form, both the analysis and synthesis of three different types of hidden Markov models. Unlike other books on the subject, it is generic and does not focus on a specific theme, e.g. speech processing. Moreover, it presents the translation of hidden Markov models' concepts from the domain of formal mathematics into computer codes using MATLAB (R). The unique feature of this book is that the theoretical concepts are first presented using an intuition-based approach followed by the description of the fundamental algorithms behind hidden Markov models using MATLAB (R). This approach, by means of analysis followed by synthesis, is suitable for those who want to study the subject using a more empirical approach. Key Selling Points: Presents a broad range of concepts related to Hidden Markov Models (HMM), from simple problems to advanced theory Covers the analysis of both continuous and discrete Markov chains Discusses the translation of HMM concepts from the realm of formal mathematics into computer code Offers many examples to supplement mathematical notation when explaining new concepts

Soft Computing Techniques for Engineering Optimization (Paperback): Kaushik Kumar, Supriyo Roy, J. Paulo Davim Soft Computing Techniques for Engineering Optimization (Paperback)
Kaushik Kumar, Supriyo Roy, J. Paulo Davim
R1,571 Discovery Miles 15 710 Ships in 10 - 15 working days

This book covers the issues related to optimization of engineering and management problems using soft computing techniques with an industrial outlook. It covers a broad area related to real life complex decision making problems using a heuristics approach. It also explores a wide perspective and future directions in industrial engineering research on a global platform/scenario. The book highlights the concept of optimization, presents various soft computing techniques, offers sample problems, and discusses related software programs complete with illustrations. Features Explains the concept of optimization and relevance to soft computing techniques towards optimal solution in engineering and management Presents various soft computing techniques Offers problems and their optimization using various soft computing techniques Discusses related software programs, with illustrations Provides a step-by-step tutorial on how to handle relevant software for obtaining the optimal solution to various engineering problems

Machine Learning for Computer and Cyber Security - Principle, Algorithms, and Practices (Paperback): Brij B. Gupta, Quan Z.... Machine Learning for Computer and Cyber Security - Principle, Algorithms, and Practices (Paperback)
Brij B. Gupta, Quan Z. Sheng
R1,673 Discovery Miles 16 730 Ships in 10 - 15 working days

While Computer Security is a broader term which incorporates technologies, protocols, standards and policies to ensure the security of the computing systems including the computer hardware, software and the information stored in it, Cyber Security is a specific, growing field to protect computer networks (offline and online) from unauthorized access, botnets, phishing scams, etc. Machine learning is a branch of Computer Science which enables computing machines to adopt new behaviors on the basis of observable and verifiable data and information. It can be applied to ensure the security of the computers and the information by detecting anomalies using data mining and other such techniques. This book will be an invaluable resource to understand the importance of machine learning and data mining in establishing computer and cyber security. It emphasizes important security aspects associated with computer and cyber security along with the analysis of machine learning and data mining based solutions. The book also highlights the future research domains in which these solutions can be applied. Furthermore, it caters to the needs of IT professionals, researchers, faculty members, scientists, graduate students, research scholars and software developers who seek to carry out research and develop combating solutions in the area of cyber security using machine learning based approaches. It is an extensive source of information for the readers belonging to the field of Computer Science and Engineering, and Cyber Security professionals. Key Features: This book contains examples and illustrations to demonstrate the principles, algorithms, challenges and applications of machine learning and data mining for computer and cyber security. It showcases important security aspects and current trends in the field. It provides an insight of the future research directions in the field. Contents of this book help to prepare the students for exercising better defense in terms of understanding the motivation of the attackers and how to deal with and mitigate the situation using machine learning based approaches in better manner.

Large Deviations For Performance Analysis - Queues, Communication and Computing (Paperback): Alan Weiss, Adam Shwartz Large Deviations For Performance Analysis - Queues, Communication and Computing (Paperback)
Alan Weiss, Adam Shwartz
R1,568 Discovery Miles 15 680 Ships in 10 - 15 working days

Originally published in 1995, Large Deviations for Performance Analysis consists of two synergistic parts. The first half develops the theory of large deviations from the beginning, through recent results on the theory for processes with boundaries, keeping to a very narrow path: continuous-time, discrete-state processes. By developing only what is needed for the applications, the theory is kept to a manageable level, both in terms of length and in terms of difficulty. Within its scope, the treatment is detailed, comprehensive and self-contained. As the book shows, there are sufficiently many interesting applications of jump Markov processes to warrant a special treatment. The second half is a collection of applications developed at Bell Laboratories. The applications cover large areas of the theory of communication networks: circuit switched transmission, packet transmission, multiple access channels, and the M/M/1 queue. Aspects of parallel computation are covered as well including, basics of job allocation, rollback-based parallel simulation, assorted priority queueing models that might be used in performance models of various computer architectures, and asymptotic coupling of processors. These applications are thoroughly analysed using the tools developed in the first half of the book.

Lattice-Based Cryptosystems - A Design Perspective (Hardcover, 1st ed. 2020): Jiang Zhang, Zhenfeng Zhang Lattice-Based Cryptosystems - A Design Perspective (Hardcover, 1st ed. 2020)
Jiang Zhang, Zhenfeng Zhang
R3,984 Discovery Miles 39 840 Ships in 10 - 15 working days

This book focuses on lattice-based cryptosystems, widely considered to be one of the most promising post-quantum cryptosystems and provides fundamental insights into how to construct provably secure cryptosystems from hard lattice problems. The concept of provable security is used to inform the choice of lattice tool for designing cryptosystems, including public-key encryption, identity-based encryption, attribute-based encryption, key change and digital signatures. Given its depth of coverage, the book especially appeals to graduate students and young researchers who plan to enter this research area.

Energy-Efficient Modular Exponential Techniques for Public-Key Cryptography - Efficient Modular Exponential Techniques... Energy-Efficient Modular Exponential Techniques for Public-Key Cryptography - Efficient Modular Exponential Techniques (Hardcover, 1st ed. 2021)
Satyanarayana Vollala, N. Ramasubramanian, Utkarsh Tiwari
R4,639 Discovery Miles 46 390 Ships in 10 - 15 working days

Cryptographic applications, such as RSA algorithm, ElGamal cryptography, elliptic curve cryptography, Rabin cryptosystem, Diffie -Hellmann key exchange algorithm, and the Digital Signature Standard, use modular exponentiation extensively. The performance of all these applications strongly depends on the efficient implementation of modular exponentiation and modular multiplication. Since 1984, when Montgomery first introduced a method to evaluate modular multiplications, many algorithmic modifications have been done for improving the efficiency of modular multiplication, but very less work has been done on the modular exponentiation to improve the efficiency. This research monograph addresses the question- how can the performance of modular exponentiation, which is the crucial operation of many public-key cryptographic techniques, be improved? The book focuses on Energy Efficient Modular Exponentiations for Cryptographic hardware. Spread across five chapters, this well-researched text focuses in detail on the Bit Forwarding Techniques and the corresponding hardware realizations. Readers will also discover advanced performance improvement techniques based on high radix multiplication and Cryptographic hardware based on multi-core architectures.

Visual Knowledge Discovery and Machine Learning (Hardcover, 1st ed. 2018): Boris Kovalerchuk Visual Knowledge Discovery and Machine Learning (Hardcover, 1st ed. 2018)
Boris Kovalerchuk
R4,756 Discovery Miles 47 560 Ships in 18 - 22 working days

This book combines the advantages of high-dimensional data visualization and machine learning in the context of identifying complex n-D data patterns. It vastly expands the class of reversible lossless 2-D and 3-D visualization methods, which preserve the n-D information. This class of visual representations, called the General Lines Coordinates (GLCs), is accompanied by a set of algorithms for n-D data classification, clustering, dimension reduction, and Pareto optimization. The mathematical and theoretical analyses and methodology of GLC are included, and the usefulness of this new approach is demonstrated in multiple case studies. These include the Challenger disaster, world hunger data, health monitoring, image processing, text classification, market forecasts for a currency exchange rate, computer-aided medical diagnostics, and others. As such, the book offers a unique resource for students, researchers, and practitioners in the emerging field of Data Science.

Introduction to Public Key Infrastructures (Hardcover, 2013 ed.): Johannes A. Buchmann, Evangelos Karatsiolis, Alexander... Introduction to Public Key Infrastructures (Hardcover, 2013 ed.)
Johannes A. Buchmann, Evangelos Karatsiolis, Alexander Wiesmaier
R2,662 Discovery Miles 26 620 Ships in 10 - 15 working days

The introduction of public key cryptography (PKC) was a critical advance in IT security. In contrast to symmetric key cryptography, it enables confidential communication between entities in open networks, in particular the Internet, without prior contact. Beyond this PKC also enables protection techniques that have no analogue in traditional cryptography, most importantly digital signatures which for example support Internet security by authenticating software downloads and updates. Although PKC does not require the confidential exchange of secret keys, proper management of the private and public keys used in PKC is still of vital importance: the private keys must remain private, and the public keys must be verifiably authentic. So understanding so-called public key infrastructures (PKIs) that manage key pairs is at least as important as studying the ingenious mathematical ideas underlying PKC.

In this book the authors explain the most important concepts underlying PKIs and discuss relevant standards, implementations, and applications. The book is structured into chapters on the motivation for PKI, certificates, trust models, private keys, revocation, validity models, certification service providers, certificate policies, certification paths, and practical aspects of PKI.

This is a suitable textbook for advanced undergraduate and graduate courses in computer science, mathematics, engineering, and related disciplines, complementing introductory courses on cryptography. The authors assume only basic computer science prerequisites, and they include exercises in all chapters and solutions in an appendix. They also include detailed pointers to relevant standards and implementation guidelines, so the book is also appropriate for self-study and reference by industrial and academic researchers and practitioners.

Realism and Complexity in Social Science (Hardcover): Malcolm Williams Realism and Complexity in Social Science (Hardcover)
Malcolm Williams
R4,488 Discovery Miles 44 880 Ships in 10 - 15 working days

Realism and Complexity in Social Science is an argument for a new approach to investigating the social world, that of complex realism. Complex realism brings together a number of strands of thought, in scientific realism, complexity science, probability theory and social research methodology. It proposes that the reality of the social world is that it is probabilistic, yet there exists enough invariance to make the discovery and explanation of social objects and causal mechanisms possible. This forms the basis for the development of a complex realist foundation for social research, that utilises a number of new and novel approaches to investigation, alongside the more traditional corpus of quantitative and qualitative methods. Research examples are drawn from research in sociology, epidemiology, criminology, social policy and human geography. The book assumes no prior knowledge of realism, probability or complexity and in the early chapters, the reader is introduced to these concepts and the arguments against them. Although the book is grounded in philosophical reasoning, this is in a direct and accessible style that will appeal both to social researchers with a methodological interest and philosophers with an interest in social investigation.

Probabilistic Data Structures for Blockchain-Based Internet of Things Applications (Hardcover): Neeraj Kumar, Arzoo Miglani Probabilistic Data Structures for Blockchain-Based Internet of Things Applications (Hardcover)
Neeraj Kumar, Arzoo Miglani
R4,498 Discovery Miles 44 980 Ships in 10 - 15 working days

This book covers theory and practical knowledge of Probabilistic data structures (PDS) and Blockchain (BC) concepts. It introduces the applicability of PDS in BC to technology practitioners and explains each PDS through code snippets and illustrative examples. Further, it provides references for the applications of PDS to BC along with implementation codes in python language for various PDS so that the readers can gain confidence using hands on experience. Organized into five sections, the book covers IoT technology, fundamental concepts of BC, PDS and algorithms used to estimate membership query, cardinality, similarity and frequency, usage of PDS in BC based IoT and so forth.

Anyone Can Code - The Art and Science of Logical Creativity (Hardcover): Ali Arya Anyone Can Code - The Art and Science of Logical Creativity (Hardcover)
Ali Arya
R4,885 Discovery Miles 48 850 Ships in 10 - 15 working days

Anyone Can Code: The Art and Science of Logical Creativity introduces computer programming as a way of problem-solving through logical thinking. It uses the notion of modularization as a central lens through which we can make sense of many software concepts. This book takes the reader through fundamental concepts in programming by illustrating them in three different and distinct languages: C/C++, Python, and Javascript. Key features: Focuses on problem-solving and algorithmic thinking instead of programming functions, syntax, and libraries; Includes engaging examples, including video games and visual effects; Provides exercises and reflective questions. This book gives beginner and intermediate learners a strong understanding of what they are doing so that they can do it better and with any other tool or language that they may end up using later.

Arc-Search Techniques for Interior-Point Methods (Hardcover): Yaguang Yang Arc-Search Techniques for Interior-Point Methods (Hardcover)
Yaguang Yang
R4,509 Discovery Miles 45 090 Ships in 10 - 15 working days

This book discusses an important area of numerical optimization, called interior-point method. This topic has been popular since the 1980s when people gradually realized that all simplex algorithms were not convergent in polynomial time and many interior-point algorithms could be proved to converge in polynomial time. However, for a long time, there was a noticeable gap between theoretical polynomial bounds of the interior-point algorithms and efficiency of these algorithms. Strategies that were important to the computational efficiency became barriers in the proof of good polynomial bounds. The more the strategies were used in algorithms, the worse the polynomial bounds became. To further exacerbate the problem, Mehrotra's predictor-corrector (MPC) algorithm (the most popular and efficient interior-point algorithm until recently) uses all good strategies and fails to prove the convergence. Therefore, MPC does not have polynomiality, a critical issue with the simplex method. This book discusses recent developments that resolves the dilemma. It has three major parts. The first, including Chapters 1, 2, 3, and 4, presents some of the most important algorithms during the development of the interior-point method around the 1990s, most of them are widely known. The main purpose of this part is to explain the dilemma described above by analyzing these algorithms' polynomial bounds and summarizing the computational experience associated with them. The second part, including Chapters 5, 6, 7, and 8, describes how to solve the dilemma step-by-step using arc-search techniques. At the end of this part, a very efficient algorithm with the lowest polynomial bound is presented. The last part, including Chapters 9, 10, 11, and 12, extends arc-search techniques to some more general problems, such as convex quadratic programming, linear complementarity problem, and semi-definite programming.

Digital Technology and Justice - Justice Apps (Hardcover): Tania Sourdin, Jacqueline Meredith, Bin Li Digital Technology and Justice - Justice Apps (Hardcover)
Tania Sourdin, Jacqueline Meredith, Bin Li
R1,779 Discovery Miles 17 790 Ships in 10 - 15 working days

Justice apps - mobile and web-based programmes that can assist individuals with legal tasks - are being produced, improved, and accessed at an unprecedented rate. These technologies have the potential to reshape the justice system, improve access to justice, and demystify legal institutions. Using artificial intelligence techniques, apps can even facilitate the resolution of common legal disputes. However, these opportunities must be assessed in light of the many challenges associated with app use in the justice sector. These include the digital divide and other accessibility issues; the ethical challenges raised by the dehumanisation of legal processes; and various privacy, security, and confidentiality risks. Surveying the landscape of this emergent industry, this book explores the objectives, opportunities, and challenges presented by apps across all areas of the justice sector. Detailed consideration is also given to the use of justice apps in specific legal contexts, including the family law and criminal law sectors. The first book to engage with justice apps, this book will appeal to a wide range of legal scholars, students, practitioners, and policy-makers.

Lognormality Principle And Its Applications In E-security, E-learning And E-health, The (Hardcover): Rejean Plamondon, Angelo... Lognormality Principle And Its Applications In E-security, E-learning And E-health, The (Hardcover)
Rejean Plamondon, Angelo Marcelli, Miguel Angel Ferrer-ballester
R3,770 Discovery Miles 37 700 Ships in 18 - 22 working days

This compendium provides a detailed account of the lognormality principle characterizing the human motor behavior by summarizing a sound theoretical framework for modeling such a behavior, introducing the most recent algorithms for extracting the lognormal components of complex movements in 2, 2.5 and 3 dimensions. It also vividly reports the most advanced applications to handwriting analysis and recognition, signature and writer verification, gesture recognition and calligraphy generation, evaluation of motor skills, improvement/degradation with aging, handwriting learning, education and developmental deficits, prescreening of children with ADHD (Attention Development and Hyperactivity Disorder), monitoring of concussion recovery, diagnosis and monitoring of Alzheimer's and Parkinson's diseases and aging effects in speech and handwriting.The volume provides a unique and useful source of references on the lognormality principle, an update on the most recent advances and an outlook at the most promising future developments in e-Security, e-Learning and e-Health.

Research Practitioner's Handbook on Big Data Analytics (Hardcover): S. Sasikala Research Practitioner's Handbook on Big Data Analytics (Hardcover)
S. Sasikala; Edited by Raghvendra Kumar; D. Renuka Devi
R3,614 Discovery Miles 36 140 Ships in 10 - 15 working days

With the growing interest in and use of big data analytics in many industries and in many research fields around the globe, this new volume addresses the need for a comprehensive resource on the core concepts of big data analytics along with the tools, techniques, and methodologies. The book gives the why and the how of big data analytics in an organized and straightforward manner, using both theoretical and practical approaches. The book's authors have organized the contents in a systematic manner, starting with an introduction and overview of big data analytics and then delving into pre-processing methods, feature selection methods and algorithms, big data streams, and big data classification. Such terms and methods as swarm intelligence, data mining, the bat algorithm and genetic algorithms, big data streams, and many more are discussed. The authors explain how deep learning and machine learning along with other methods and tools are applied in big data analytics. The last section of the book presents a selection of illustrative case studies that show examples of the use of data analytics in industries such as health care, business, education, and social media. Research Practitioner's Handbook on Big Data Analytics will be a valuable addition to the libraries of practitioners in data collection in many industries along with research scholars and faculty in the domain of big data analytics. The book can also serve as a handy textbook for courses in data collection, data mining, and big data analytics.

Recommender Systems: Advanced Developments (Hardcover): Jie Lu, Qian Zhang, Guangquan Zhang Recommender Systems: Advanced Developments (Hardcover)
Jie Lu, Qian Zhang, Guangquan Zhang
R3,299 Discovery Miles 32 990 Ships in 18 - 22 working days

Recommender systems provide users (businesses or individuals) with personalized online recommendations of products or information, to address the problem of information overload and improve personalized services. Recent successful applications of recommender systems are providing solutions to transform online services for e-government, e-business, e-commerce, e-shopping, e-library, e-learning, e-tourism, and more.This unique compendium not only describes theoretical research but also reports on new application developments, prototypes, and real-world case studies of recommender systems. The comprehensive volume provides readers with a timely snapshot of how new recommendation methods and algorithms can overcome challenging issues. Furthermore, the monograph systematically presents three dimensions of recommender systems - basic recommender system concepts, advanced recommender system methods, and real-world recommender system applications.By providing state-of-the-art knowledge, this excellent reference text will immensely benefit researchers, managers, and professionals in business, government, and education to understand the concepts, methods, algorithms and application developments in recommender systems.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
MATLAB Applications in Engineering
Constantin Volosencu Hardcover R3,055 Discovery Miles 30 550
A Textbook of Data Structures and…
Vijayalakshmi P Hardcover R3,522 Discovery Miles 35 220
A Textbook of Data Structures and…
Vijayalakshmi P Hardcover R3,522 Discovery Miles 35 220
Concept Parsing Algorithms (CPA) for…
Uri Shafrir, Masha Etkind Hardcover R3,276 Discovery Miles 32 760
C Programming - C Programming Language…
Adam Dodson Hardcover R551 R505 Discovery Miles 5 050
The Application of Ant Colony…
Ali Soofastaei Hardcover R2,553 Discovery Miles 25 530
Comprehensive Metaheuristics…
S. Ali Mirjalili, Amir Hossein Gandomi Paperback R3,956 Discovery Miles 39 560
Genetic Algorithms with Python
Clinton Sheppard Hardcover R856 R812 Discovery Miles 8 120
Algorithms in Bioinformatics - Theory…
PA Gagniuc Hardcover R3,174 Discovery Miles 31 740
The Physics of Computing
Marilyn Wolf Paperback R1,645 Discovery Miles 16 450

 

Partners