![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Applications of computing > Databases
Selected Areas in Cryptography brings together in one place important contributions and up-to-date research results in this fast moving area. Selected Areas in Cryptography serves as an excellent reference, providing insight into some of the most challenging research issues in the field.
This book presents the collection of the accepted research papers presented in the 1st 'International Conference on Computational Intelligence and Sustainable Technologies (ICoCIST-2021)'. This edited book contains the articles related to the themes on artificial intelligence in machine learning, big data analysis, soft computing techniques, pattern recognitions, sustainable infrastructural development, sustainable grid computing and innovative technology for societal development, renewable energy, and innovations in Internet of Things (IoT).
This book presents the potential use and implementation of intelligent techniques in decision making processes involved in organizations and companies. It provides a thorough analysis of decisions, reviewing the classical decision theory, and describing usual methods for modeling the decision process. It describes the chronological evolution of Decision Support Systems (DSS) from early Management Information Systems until the appearance of Intelligent Decision Support Systems (IDSS). It explains the most commonly used intelligent techniques, both data-driven and model-driven, and illustrates the use of knowledge models in Decision Support through case studies. The author pays special attention to the whole Data Science process, which provides intelligent data-driven models in IDSS. The book describes main uncertainty models used in Artificial Intelligence to model inexactness; covers recommender systems; and reviews available development tools for inducing data-driven models, for using model-driven methods and for aiding the development of Intelligent Decision Support Systems
This second volume of the book series shows R-calculus is a combination of one monotonic tableau proof system and one non-monotonic one. The R-calculus is a Gentzen-type deduction system which is non-monotonic, and is a concrete belief revision operator which is proved to satisfy the AGM postulates and the DP postulates. It discusses the algebraical and logical properties of tableau proof systems and R-calculi in many-valued logics. This book offers a rich blend of theory and practice. It is suitable for students, researchers and practitioners in the field of logic. Also it is very useful for all those who are interested in data, digitization and correctness and consistency of information, in modal logics, non monotonic logics, decidable/undecidable logics, logic programming, description logics, default logics and semantic inheritance networks.
This book presents the proceedings of the 9th Asian South Pacific Association of Sport Psychology International Congress (ASPASP) 2022, Kuching, Malaysia, which entails the different sporting innovation themes, namely, Applied Sport and Social Psychology, Health and Exercise, Motor Control and Learning, Counselling and Clinical Psychology, Biomechanics, Data Mining and Machine Learning in Sports amongst others. It presents the state-of-the-art technological advancements towards the aforesaid themes and provides a platform to shape the future direction of sport science, specifically in the field sports and exercise psychology. ​
This book gathers extended versions of papers presented at DoSIER 2021 (the 2021 Third Doctoral Symposium on Intelligence Enabled Research, held at Cooch Behar Government Engineering College, West Bengal, India, during November 12-13, 2021). The papers address the rapidly expanding research area of computational intelligence, which, no longer limited to specific computational fields, has since made inroads in signal processing, smart manufacturing, predictive control, robot navigation, smart cities, and sensor design, to name but a few. Presenting chapters written by experts active in these areas, the book offers a valuable reference guide for researchers and industrial practitioners alike and inspires future studies.
In the world as we know it, you can be attacked both physically and virtually. For today's organisations, which rely so heavily on technology - particularly the Internet - to do business, the latter is the far more threatening of the two. The cyber threat landscape is complex and constantly changing. For every vulnerability fixed, another pops up, ripe for exploitation. This book is a comprehensive cyber security implementation manual which gives practical guidance on the individual activities identified in the IT Governance Cyber Resilience Framework (CRF) that can help organisations become cyber resilient and combat the cyber threat landscape. Suitable for senior directors (CEO, CISO, CIO), compliance managers, privacy managers, IT managers, security analysts and others, the book is divided into six parts: Part 1: Introduction. The world of cyber security and the approach taken in this book. Part 2: Threats and vulnerabilities. A discussion of a range of threats organisations face, organised by threat category, to help you understand what you are defending yourself against before you start thinking about your actual defences. Part 3: The CRF processes. Detailed discussions of each of the 24 CRF processes, explaining a wide range of security areas by process category and offering guidance on how to implement each. Part 4: Eight steps to implementing cyber security. Our eight-step approach to implementing the cyber security processes you need and maintaining them. Part 5: Reference frameworks. An explanation of how standards and frameworks work, along with their benefits. It also presents ten framework options, introducing you to some of the best-known standards and giving you an idea of the range available. Part 6: Conclusion and appendices. The appendices include a glossary of all the acronyms and abbreviations used in this book. Whether you are just starting out on the road to cyber security or looking to enhance and improve your existing cyber resilience programme, it should be clear that cyber security is no longer optional in today's information age; it is an essential component of business success. Make sure you understand the threats and vulnerabilities your organisation faces and how the Cyber Resilience Framework can help you tackle them. Start your journey to cyber security now - buy this book today!
This book focuses on the changes which big data brings to human's society and personal thinking models. The author uses the concept of "data civilization" to reveal that we have entered a brand-new era on civilization level, which could be found and understood from three levels: human data civilization, commercial data civilization, and personal data civilization. There is no doubt data civilization will inevitably make a profound influence on the subversion and reconstruction of human beings including business, society, and thinking models. The book presents a unique perspective to understand the world which is dominated by data more and more.
This publication is a collection of papers from the Third International Working Conference of IFIP TC-11 Working group 11.5 on "Integrity and Internal Control in Information systems". IFIP TC-11 Working Group 11.5 explores the area of integrity within information systems and the relationship between integrity in information systems and the overall internal control systems that are established in organizations to support the corporate governance codes. We want to recommend this book to security specialists, IT auditors and researchers who want to learn more about the business concerns related to integrity. Those same security specialists, IT auditors and researchers will also value this book for the papers presenting research into new techniques and methods for obtaining the desired level of integrity. The third conference represents a continuation of the dialogue between information security specialists, internal control specialists and the business community. The conference objectives are: * To present methods and techniques that will help business achieve the desired level of integrity in information systems and data; * To present the results of research that may in future be used to increase the level of integrity or help management maintain the desired level of integrity; * To investigate the shortcomings in the technologies presently in use, shortcomings that require attention in order to protect the integrity of systems in general.
Our society keeps growing with a large number of complicated
machines and systems, while we are spending our diverse lives. The
number of aged people has been increasing in the society. It is
more likely than ever that we are involved in dangers, accidents,
crimes, and disasters. Securing and supporting our daily life,
building reliable infrastructures against large scale disasters,
and preventing unexpected human errors are crucial issues in our
highly developed complex society.
Education and Technology for a Better World was the main theme for WCCE 2009. The conference highlights and explores different perspectives of this theme, covering all levels of formal education as well as informal learning and societal aspects of education. The conference was open to everyone involved in education and training. Additionally players from technological, societal, business and political fields outside education were invited to make relevant contributions within the theme: Education and Technology for a Better World. For several years the WCCE (World Conference on Computers in Education) has brought benefits to the fields of computer science and computers and education as well as to their communities. The contributions at WCCE include research projects and good practice presented in different formats from full papers to posters, demonstrations, panels, workshops and symposiums. The focus is not only on presentations of accepted contributions but also on discussions and input from all participants. The main goal of these conferences is to provide a forum for the discussion of ideas in all areas of computer science and human learning. They create a unique environment in which researchers and practitioners in the fields of computer science and human learning can interact, exchanging theories, experiments, techniques, applications and evaluations of initiatives supporting new developments that are potentially relevant for the development of these fields. They intend to serve as reference guidelines for the research community.
What is the cost of employees today and what will this be in the future? This book explains how to take a data-driven approach to workforce planning and allow the business to reach its strategic goals. Organizational Planning and Analysis (OP&A) is a data-driven approach to workforce planning. It allows HR professionals, OD practitioners and business leaders to monitor an organization's activities and analyse business data to regularly adjust plans to ensure that the business succeeds. This book covers everything from how to build an OP&A function, the difference between strategic and operational workforce planning and how to manage demand and supply through to how to match people to new or changing roles and develop robust succession planning. Organizational Planning and Analysis also covers how OP&A works with HR operations including recruitment, L&D, reward and performance management and includes a chapter on new human capital analytics which allow a business to improve the return on investment for each of its employees. Full of practical advice and step by step guidance, this book is also supported by case studies from organizations including KPMG, Sainsbury's, WPP, Accenture, TSB, Johnson & Johnson, Aer Lingus and FedEx.
This monograph offers an original broad and very diverse exploration of the seriation domain in data analysis, together with building a specific relation to clustering.Relative to a data table crossing a set of objects and a set of descriptive attributes, the search for orders which correspond respectively to these two sets is formalized mathematically and statistically. State-of-the-art methods are created and compared with classical methods and a thorough understanding of the mutual relationships between these methods is clearly expressed. The authors distinguish two families of methods: Geometric representation methods Algorithmic and Combinatorial methods Original and accurate methods are provided in the framework for both families. Their basis and comparison is made on both theoretical and experimental levels. The experimental analysis is very varied and very comprehensive. Seriation in Combinatorial and Statistical Data Analysis has a unique character in the literature falling within the fields of Data Analysis, Data Mining and Knowledge Discovery. It will be a valuable resource for students and researchers in the latter fields.
This book provides a collection of recent research works addressing theoretical issues on improving the learning process and the generalization of GANs as well as state-of-the-art applications of GANs to various domains of real life. Adversarial learning fascinates the attention of machine learning communities across the world in recent years. Generative adversarial networks (GANs), as the main method of adversarial learning, achieve great success and popularity by exploiting a minimax learning concept, in which two networks compete with each other during the learning process. Their key capability is to generate new data and replicate available data distributions, which are needed in many practical applications, particularly in computer vision and signal processing. The book is intended for academics, practitioners, and research students in artificial intelligence looking to stay up to date with the latest advancements on GANs' theoretical developments and their applications.
Safety-Critical Real-Time Systems brings together in one place important contributions and up-to-date research results in this fast moving area. Safety-Critical Real-Time Systems serves as an excellent reference, providing insight into some of the most challenging research issues in the field.
Using Android as a reference, this book teaches the development of mobile apps designed to be responsive, trustworthy and robust, and optimized for maintainability. As the share of mission-critical mobile apps continues to increase in the ever-expanding mobile app ecosystem, it has become imperative that processes and procedures to assure their reliance are developed and included in the software life cycle at opportune times. Memory, CPU, battery life and screen size limitations of smartphones coupled with volatility associated with mobile environments underlines that the quality assurance strategies that proved to be successful for desktop applications may no longer be effective in mobile apps. To that effect, this book lays a foundation upon which quality assurance processes and procedures for mobile apps could be devised. This foundation is composed of analytical models, experimental test-beds and software solutions. Analytical models proposed in the literature to predict software quality are studied and adapted for mobile apps. The efficacy of these analytical models in prejudging the operations of mobile apps under design and development is evaluated. A comprehensive test suite is presented that empirically assesses a mobile app's compliance to its quality expectations. Test procedures to measure quality attributes such as maintainability, usability, performance, scalability, reliability, availability and security, are detailed. Utilization of test tools provided in Android Studio as well as third-party vendors in constructing the corresponding test-beds is highlighted. An in-depth exploration of utilities, services and frameworks available on Android is conducted, and the results of their parametrization observed through experimentation to construct quality assurance solutions are presented. Experimental development of some example mobile apps is conducted to gauge adoption of process models and determine favorable opportunities for integrating the quality assurance processes and procedures in the mobile app life cycle. The role of automation in testing, integration, deployment and configuration management is demonstrated to offset cost overheads of integrating quality assurance process in the life cycle of mobile apps.
Semantics and ontologies offer an extension to traditional information systems in which information is given well-defined meaning, enabling computers and people to work in cooperation. With expanding uses and integrations of semantics and ontologies, research in Semantic Web engineering has grown immensely. Semantic Web Engineering in the Knowledge Society brings together contributions from researchers and scientists from both industry and academia and representatives from different communities for the understanding and exploration of the theories, tools, and applications of semantics and ontologies. This authoritative reference serves as the platform for exchange of both practical technologies and far reaching implications, offering academicians and practitioners a compendium of knowledge in Semantic Web engineering.
The book features original papers from the 2nd International Conference on Smart IoT Systems: Innovations and Computing (SSIC 2019), presenting scientific work related to smart solution concepts. It discusses computational collective intelligence, which includes interactions between smart devices, smart environments and smart interactions, as well as information technology support for such areas. It also describes how to successfully approach various government organizations for funding for business and the humanitarian technology development projects. Thanks to the high-quality content and the broad range of the topics covered, the book appeals to researchers pursuing advanced studies.
Fuzzy cognitive maps (FCMs) have gained popularity in the scientific community due to their capabilities in modeling and decision making for complex problems.This book presents a novel algorithm called glassoFCM to enable automatic learning of FCM models from data. Specifically, glassoFCM is a combination of two methods, glasso (a technique originated from machine learning) for data modeling and FCM simulation for decision making. The book outlines that glassoFCM elaborates simple, accurate, and more stable models that are easy to interpret and offer meaningful decisions. The research results presented are based on an investigation related to a real-world business intelligence problem to evaluate characteristics that influence employee work readiness.Finally, this book provides readers with a step-by-step guide of the 'fcm' package to execute and visualize their policies and decisions through the FCM simulation process.
Most of the papers in this volume were first presented at the Workshop on Cross-Linguistic Information Retrieval that was held August 22, 1996 dur ing the SIGIR'96 Conference. Alan Smeaton of Dublin University and Paraic Sheridan of the ETH, Zurich, were the two other members of the Scientific Committee for this workshop. SIGIR is the Association for Computing Ma chinery (ACM) Special Interest Group on Information Retrieval, and they have held conferences yearly since 1977. Three additional papers have been added: Chapter 4 Distributed Cross-Lingual Information retrieval describes the EMIR retrieval system, one of the first general cross-language systems to be implemented and evaluated; Chapter 6 Mapping Vocabularies Using Latent Semantic Indexing, which originally appeared as a technical report in the Lab oratory for Computational Linguistics at Carnegie Mellon University in 1991, is included here because it was one of the earliest, though hard-to-find, publi cations showing the application of Latent Semantic Indexing to the problem of cross-language retrieval; and Chapter 10 A Weighted Boolean Model for Cross Language Text Retrieval describes a recent approach to solving the translation term weighting problem, specific to Cross-Language Information Retrieval. Gregory Grefenstette CONTRIBUTORS Lisa Ballesteros David Hull W, Bruce Croft Gregory Grefenstette Center for Intelligent Xerox Research Centre Europe Information Retrieval Grenoble Laboratory Computer Science Department University of Massachusetts Thomas K. Landauer Department of Psychology Mark W. Davis and Institute of Cognitive Science Computing Research Lab University of Colorado, Boulder New Mexico State University Michael L. Littman Bonnie J."
This book paves the road for researchers from various areas of engineering working in the realm of smart cities to discuss the intersections in these areas when it comes to infrastructure and its flexibility. The authors lay out models, algorithms and frameworks related to the 'smartness' in the future smart cities. In particular, manufacturing firms, electric generation, transmission and distribution utilities, hardware and software computer companies, automation and control manufacturing firms, and other industries will be able to use this book to enhance their energy operations, improve their comfort and privacy, as well as to increase the benefit from the electrical system. The book pertains to researchers, professionals, and R&D in an array of industries.
Machine learning (ML) has become a commonplace element in our everyday lives and a standard tool for many fields of science and engineering. To make optimal use of ML, it is essential to understand its underlying principles. This book approaches ML as the computational implementation of the scientific principle. This principle consists of continuously adapting a model of a given data-generating phenomenon by minimizing some form of loss incurred by its predictions. The book trains readers to break down various ML applications and methods in terms of data, model, and loss, thus helping them to choose from the vast range of ready-made ML methods. The book's three-component approach to ML provides uniform coverage of a wide range of concepts and techniques. As a case in point, techniques for regularization, privacy-preservation as well as explainability amount to specific design choices for the model, data, and loss of a ML method.
This book provides a written record of the synergy that already exists among the research communities and represents a solid framework in the advancement of big data and cloud computing disciplines from which new interaction will result in the future. This book is a compendium of the International Conference on Big Data and Cloud Computing (ICBDCC 2021). It includes recent advances in big data analytics, cloud computing, the Internet of nano things, cloud security, data analytics in the cloud, smart cities and grids, etc. This book primarily focuses on the application of knowledge that promotes ideas for solving the problems of society through cutting-edge technologies. The articles featured in this book provide novel ideas that contribute to the growth of world-class research and development. The contents of this book are of interest to researchers and professionals alike.
This book is a collection of high scientific novel contributions addressing several of these challenges. These articles are extended versions of a selection of the best papers that were initially presented at the French-speaking conferences EGC'2019held in Metz (France, January 21-25, 2019). These extended versions have been accepted after an additional peer-review process among papers already accepted in long format at the conference. Concerning the conference, the long and short papers selection were also the result of a double blind peer review process among the hundreds of papers initially submitted to each edition of the conference (acceptance rate for long papers is about 25%. |
You may like...
Big Data and Smart Service Systems
Xiwei Liu, Rangachari Anand, …
Hardcover
Management Of Information Security
Michael Whitman, Herbert Mattord
Paperback
Utilizing Blockchain Technologies in…
S. B. Goyal, Nijalingappa Pradeep, …
Hardcover
R6,170
Discovery Miles 61 700
Opinion Mining and Text Analytics on…
Pantea Keikhosrokiani, Moussa Pourya Asl
Hardcover
R9,276
Discovery Miles 92 760
|