0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (53)
  • R250 - R500 (378)
  • R500+ (14,852)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases

3D Surface Reconstruction - Multi-Scale Hierarchical Approaches (Hardcover, 2013 ed.): Francesco Bellocchio, N. Alberto... 3D Surface Reconstruction - Multi-Scale Hierarchical Approaches (Hardcover, 2013 ed.)
Francesco Bellocchio, N. Alberto Borghese, Stefano Ferrari, Vincenzo Piuri
R2,873 Discovery Miles 28 730 Ships in 10 - 15 working days

"3D Surface Reconstruction: Multi-Scale Hierarchical Approaches "presents methods to model 3D objects in an incremental way so as to capture more finer details at each step. The configuration of the model parameters, the rationale and solutions are described and discussed in detail so the reader has a strong understanding of the methodology. Modeling starts from data captured by 3D digitizers and makes the process even more clear and engaging.

Innovative approaches, based on two popular machine learning paradigms, namely Radial Basis Functions and the Support Vector Machines, are also introduced. These paradigms are innovatively extended to a multi-scale incremental structure, based on a hierarchical scheme. The resulting approaches allow readers to achieve high accuracy with limited computational complexity, and makes the approaches appropriate for online, real-time operation. Applications can be found in any domain in which regression is required.

"3D Surface Reconstruction: Multi-Scale Hierarchical Approaches" is designed as a secondary text book or reference for advanced-level students and researchers in computer science. This book also targets practitioners working in computer vision or machine learning related fields.

Security and Privacy in the Age of Uncertainty - IFIP TC11 18th International Conference on Information Security (SEC2003) May... Security and Privacy in the Age of Uncertainty - IFIP TC11 18th International Conference on Information Security (SEC2003) May 26-28, 2003, Athens, Greece (Hardcover, 2003 ed.)
Sabrina de Capitani di Vimercati, Pierangela Samarati, Sokratis Katsikas
R3,175 Discovery Miles 31 750 Ships in 10 - 15 working days

In light of the rapidly escalating age of uncertainty in the IT security and privacy world, this book provides the professional IT community and, in particular, security and data protection experts and researchers, with a selection of state-of-the-art material on emerging technologies for IT security and privacy issues. Furthermore, the book analyzes the new security threats and vulnerabilities that appear in modern information societies.

Security and Privacy in the Age of Uncertainty covers issues related to security and privacy of information in a wide range of applications including:
*Secure Networks and Distributed Systems;
*Secure Multicast Communication and Secure Mobile Networks;
*Intrusion Prevention and Detection;
*Access Control Policies and Models;
*Security Protocols;
*Security and Control of IT in Society. This volume contains the papers selected for presentation at the 18th International Conference on Information Security (SEC2003) and at the associated workshops. The conference and workshops were sponsored by the International Federation for Information Processing (IFIP) and held in Athens, Greece in May 2003.

Hands-On Database (Paperback, 2nd edition): Steve Conger Hands-On Database (Paperback, 2nd edition)
Steve Conger
R4,033 Discovery Miles 40 330 Ships in 12 - 19 working days

"Hands-On Database "uses a scenario-based approach that shows readers how to build a database by providing them with the context of a running case throughout each step of the process.

Domain Driven Data Mining (Hardcover, 2010 ed.): Longbing Cao, Philip S. Yu, Chengqi Zhang, Yanchang Zhao Domain Driven Data Mining (Hardcover, 2010 ed.)
Longbing Cao, Philip S. Yu, Chengqi Zhang, Yanchang Zhao
R3,024 Discovery Miles 30 240 Ships in 10 - 15 working days

Data mining has emerged as one of the most active areas in information and c- munication technologies(ICT). With the boomingof the global economy, and ub- uitouscomputingandnetworkingacrosseverysectorand business, data andits deep analysis becomes a particularly important issue for enhancing the soft power of an organization, its production systems, decision-making and performance. The last ten years have seen ever-increasingapplications of data mining in business, gove- ment, social networks and the like. However, a crucial problem that prevents data mining from playing a strategic decision-support role in ICT is its usually limited decision-support power in the real world. Typical concerns include its actionability, workability, transferability, and the trustworthy, dependable, repeatable, operable and explainable capabilities of data mining algorithms, tools and outputs. This monograph, Domain Driven Data Mining, is motivated by the real-world challenges to and complexities of the current KDD methodologies and techniques, which are critical issues faced by data mining, as well as the ?ndings, thoughts and lessons learned in conducting several large-scale real-world data mining bu- ness applications. The aim and objective of domain driven data mining is to study effective and ef?cient methodologies, techniques, tools, and applications that can discover and deliver actionable knowledge that can be passed on to business people for direct decision-making and action-takin

Secure Broadcast Communication - In Wired and Wireless Networks (Hardcover, 2003 ed.): Adrian Perrig, J. D. Tygar Secure Broadcast Communication - In Wired and Wireless Networks (Hardcover, 2003 ed.)
Adrian Perrig, J. D. Tygar
R3,010 Discovery Miles 30 100 Ships in 10 - 15 working days

Secure Broadcast Communication in Wired and Wireless Networks presents a set of fundamental protocols for building secure information distribution systems. Applications include wireless broadcast, IP multicast, sensor networks and webs, ad hoc networks, and satellite broadcast. This book presents and compares new techniques for basic operations including:
*key distribution for access control,
*source authentication of transmissions, and
*non-repudiation of streams.

This book discusses how to realize these operations both with high performance processors and resource constrained processors. It shows how to protect against adversaries who inject packets or eavesdrop. The focus is on functional descriptions rather than theoretical discussions. Protocols are presented as basic building blocks that can be combined with each other and traditional security protocols. The book illustrates these protocols in practice by presenting a real implementation that provides security for an ad hoc sensor network.

This book can serve as a textbook or supplementary reading in graduate level courses on security or networking, or can be used for self study.

Cybersecurity Research Analysis Report for Europe and Japan - Cybersecurity and Privacy Dialogue Between Europe and Japan... Cybersecurity Research Analysis Report for Europe and Japan - Cybersecurity and Privacy Dialogue Between Europe and Japan (Hardcover, 1st ed. 2021)
Anna Felkner, Youki Kadobayashi, Marek Janiszewski, Stefano Fantin, Jose Francisco Ruiz, …
R4,102 Discovery Miles 41 020 Ships in 10 - 15 working days

This book contains the key findings related to cybersecurity research analysis for Europe and Japan collected during the EUNITY project. A wide-scope analysis of the synergies and differences between the two regions, the current trends and challenges is provided. The survey is multifaceted, including the relevant legislation, policies and cybersecurity agendas, roadmaps and timelines at the EU and National levels in Europe and in Japan, including the industry and standardization point of view, identifying and prioritizing the joint areas of interests. Readers from both industry and academia in the EU or Japan interested in entering international cybersecurity cooperation with each other or adding an R&D aspect to an existing one will find it useful in understanding the legal and organizational context and identifying most promising areas of research. Readers from outside EU and Japan may compare the findings with their own cyber-R&D landscape or gain context when entering those markets.

Proceedings of the 4th International Conference on Electrical and Information Technologies for Rail Transportation (EITRT) 2019... Proceedings of the 4th International Conference on Electrical and Information Technologies for Rail Transportation (EITRT) 2019 - Rail Transportation Information Processing and Operational Management Technologies (Hardcover, 1st ed. 2020)
Baoming Liu, Limin Jia, Yong Qin, Zhigang Liu, Lijun Diao, …
R5,742 Discovery Miles 57 420 Ships in 10 - 15 working days

This book reflects the latest research trends, methods and experimental results in the field of electrical and information technologies for rail transportation, which covers abundant state-of-the-art research theories and ideas. As a vital field of research that is highly relevant to current developments in a number of technological domains, the subjects it covered include intelligent computing, information processing, Communication Technology, Automatic Control, etc. The objective of the proceedings is to provide a major interdisciplinary forum for researchers, engineers, academicians as well as industrial professionals to present the most innovative research and development in the field of rail transportation electrical and information technologies. Engineers and researchers in academia, industry, and the government will also explore an insight view of the solutions that combine ideas from multiple disciplines in this field. The volumes serve as an excellent reference work for researchers and graduate students working on rail transportation, electrical and information technologies.

Real World AI Ethics for Data Scientists - Practical Case Studies (Paperback): Nachshon (Sean) Goltz, Tracey Dowdeswell Real World AI Ethics for Data Scientists - Practical Case Studies (Paperback)
Nachshon (Sean) Goltz, Tracey Dowdeswell
R1,362 Discovery Miles 13 620 Ships in 12 - 19 working days

Designed to offer an accessible set of case studies and analyses of ethical dilemmas in data science. This book will be suitable for technical readers in data science who want to understand diverse ethical approaches to AI.

The Era of NFTs - A Beginner's Guide To Understanding The Utility & Investment Opportunity Of Non-Fungible Tokens (NFTs)... The Era of NFTs - A Beginner's Guide To Understanding The Utility & Investment Opportunity Of Non-Fungible Tokens (NFTs) (Hardcover)
Alex Caine, Matthew Thrush
R752 Discovery Miles 7 520 Ships in 12 - 19 working days
Networked RFID Systems and Lightweight Cryptography - Raising Barriers to Product Counterfeiting (Hardcover, Illustrated Ed):... Networked RFID Systems and Lightweight Cryptography - Raising Barriers to Product Counterfeiting (Hardcover, Illustrated Ed)
Peter H. Cole, Damith C. Ranasinghe
R1,572 Discovery Miles 15 720 Ships in 10 - 15 working days

This book consists of a collection of works on utilizing the automatic identification technology provided by Radio Frequency Identification (RFID) to address the problems of global counterfeiting of goods. The book presents current research, directed to securing supply chains against the efforts of counterfeit operators, carried out at the Auto-ID Labs around the globe. It assumes very little knowledge on the part of the reader on Networked RFID systems as the material provided in the introduction familiarizes the reader with concepts, underlying principles and vulnerabilities of modern RFID systems.

Explainable AI Within the Digital Transformation and Cyber Physical Systems - XAI Methods and Applications (Hardcover, 1st ed.... Explainable AI Within the Digital Transformation and Cyber Physical Systems - XAI Methods and Applications (Hardcover, 1st ed. 2021)
Moamar Sayed-Mouchaweh
R5,091 Discovery Miles 50 910 Ships in 10 - 15 working days

This book presents Explainable Artificial Intelligence (XAI), which aims at producing explainable models that enable human users to understand and appropriately trust the obtained results. The authors discuss the challenges involved in making machine learning-based AI explainable. Firstly, that the explanations must be adapted to different stakeholders (end-users, policy makers, industries, utilities etc.) with different levels of technical knowledge (managers, engineers, technicians, etc.) in different application domains. Secondly, that it is important to develop an evaluation framework and standards in order to measure the effectiveness of the provided explanations at the human and the technical levels. This book gathers research contributions aiming at the development and/or the use of XAI techniques in order to address the aforementioned challenges in different applications such as healthcare, finance, cybersecurity, and document summarization. It allows highlighting the benefits and requirements of using explainable models in different application domains in order to provide guidance to readers to select the most adapted models to their specified problem and conditions. Includes recent developments of the use of Explainable Artificial Intelligence (XAI) in order to address the challenges of digital transition and cyber-physical systems; Provides a textual scientific description of the use of XAI in order to address the challenges of digital transition and cyber-physical systems; Presents examples and case studies in order to increase transparency and understanding of the methodological concepts.

ICT Critical Infrastructures and Society - 10th IFIP TC 9 International Conference on Human Choice and Computers, HCC10 2012,... ICT Critical Infrastructures and Society - 10th IFIP TC 9 International Conference on Human Choice and Computers, HCC10 2012, Amsterdam, The Netherlands, September 27-28, 2012, Proceedings (Hardcover, 2012 ed.)
Magda David Hercheui, Diane Whitehouse, William McIver Jr, Jackie Phahlamohlaka
R2,938 Discovery Miles 29 380 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 10th IFIP TC 9 International Conference on Human Choice and Computers, HCC10 2012, held in Amsterdam, The Netherlands, in September 2012. The 37 revised full papers presented were carefully reviewed and selected for inclusion in the volume. The papers are organized in topical sections on national and international policies, sustainable and responsible innovation, ICT for peace and war, and citizens' involvement, citizens' rights and ICT.

Information and Communication Technology for Sustainable Development - Proceedings of ICT4SD 2016, Volume 2 (Hardcover, 1st ed.... Information and Communication Technology for Sustainable Development - Proceedings of ICT4SD 2016, Volume 2 (Hardcover, 1st ed. 2018)
Durgesh Kumar Mishra, Malaya Kumar Nayak, Amit Joshi
R9,349 R7,009 Discovery Miles 70 090 Save R2,340 (25%) Ships in 12 - 19 working days

The book proposes new technologies and discusses future solutions for design infrastructure for ICT. The book contains high quality submissions presented at Second International Conference on Information and Communication Technology for Sustainable Development (ICT4SD - 2016) held at Goa, India during 1 - 2 July, 2016. The conference stimulates the cutting-edge research discussions among many academic pioneering researchers, scientists, industrial engineers, and students from all around the world. The topics covered in this book also focus on innovative issues at international level by bringing together the experts from different countries.

Foundations of Real-Time Computing: Scheduling and Resource Management (Hardcover, 1991 ed.): Andre M.Van Tilborg, Gary M. Koob Foundations of Real-Time Computing: Scheduling and Resource Management (Hardcover, 1991 ed.)
Andre M.Van Tilborg, Gary M. Koob
R4,542 Discovery Miles 45 420 Ships in 10 - 15 working days

This volume contains a selection of papers that focus on the state-of the-art in real-time scheduling and resource management. Preliminary versions of these papers were presented at a workshop on the foundations of real-time computing sponsored by the Office of Naval Research in October, 1990 in Washington, D.C. A companion volume by the title Foundations of Real-Time Computing: Fonnal Specifications and Methods complements this book by addressing many of the most advanced approaches currently being investigated in the arena of formal specification and verification of real-time systems. Together, these two texts provide a comprehensive snapshot of current insights into the process of designing and building real-time computing systems on a scientific basis. Many of the papers in this book take care to define the notion of real-time system precisely, because it is often easy to misunderstand what is meant by that term. Different communities of researchers variously use the term real-time to refer to either very fast computing, or immediate on-line data acquisition, or deadline-driven computing. This text is concerned with the very difficult problems of scheduling tasks and resource management in computer systems whose performance is inextricably fused with the achievement of deadlines. Such systems have been enabled for a rapidly increasing set of diverse end-uses by the unremitting advances in computing power per constant-dollar cost and per constant-unit-volume of space. End-use applications of deadline-driven real-time computers span a spectrum that includes transportation systems, robotics and manufacturing, aerospace and defense, industrial process control, and telecommunications."

Heterogeneous Information Exchange and Organizational Hubs (Hardcover, 2002 ed.): H. Bestougeff, J.E. Dubois, B. Thuraisingham Heterogeneous Information Exchange and Organizational Hubs (Hardcover, 2002 ed.)
H. Bestougeff, J.E. Dubois, B. Thuraisingham
R3,018 Discovery Miles 30 180 Ships in 10 - 15 working days

Helene Bestougeff, Universite de Marne Ia Vallee, France Jacques-Emile Dubois, Universite Paris VII-Denis Diderot, France Bhavani Thuraisingham, MITRE Corporation, USA The last fifty years promoted the conceptual trio: Knowledge, Information and Data (KID) to the center of our present scientific technological and human activities. The intrusion of the Internet drastically modified the historical cycles of communication between authors, providers and users. Today, information is often the result of the interaction between data and the knowledge based on their comprehension, interpretation and prediction. Nowadays important goals involve the exchange of heterogeneous information, as many real life and even specific scientific and technological problems are all interdisciplinary by nature. For a specific project, this signifies extracting information, data and even knowledge from many different sources that must be addressed by interoperable programs. Another important challenge is that of corporations collaborating with each other and forming coalitions and partnerships. One development towards achieving this challenge is organizational hubs. This concept is new and still evolving. Much like an airport hub serving air traffic needs, organizational hubs are central platforms that provide information and collaboration specific to a group of users' needs. Now companies are creating hubs particular to certain types of industries. The users of hubs are seen as communities for which all related information is directly available without further searching efforts and often with value-added services.

Security Engineering for Service-Oriented Architectures (Hardcover, 2009 ed.): Michael Hafner, Ruth Breu Security Engineering for Service-Oriented Architectures (Hardcover, 2009 ed.)
Michael Hafner, Ruth Breu
R1,543 Discovery Miles 15 430 Ships in 10 - 15 working days

The growing popularity of Service Oriented Architectures is mainly due to business and technology trendsthat have crystallized over thepast decade. On the business side, companies struggle to survive in a competitive - vironment that pushes them towards a tighter integration into an industry's value chain, to outsource non core business operations or to constantly- engineer business processes. These challenges boosted the demand for sc- able IT-solutions, with e?orts ultimately resulting in a ?exible architectural paradigm - Service Oriented Architectures. On the technical side, middleware standards, technologies and archit- turesbasedonXMLand Webservicesaswellastheirsecurityextensionshave matured to a sound technology base that guarantees interoperability across enterprise and application boundaries - a prerequisite to inter-organizational applications and work?ows. While the principles and concepts of Service Oriented Architectures may lookevidentandcogentfromaconceptualperspective, therealizationofint- organizational work?ows and applications based on the paradigm "Service Oriented Architecture" remains a complex task, and, all the more when it comes to security, the implementation is still bound to low-level technical knowledgeandhence error-prone. The number of books and publications o?ering implementation-level c- erageofthetechnologies, standardsandspeci?cationsasrequiredbytechnical developers lookingfor guidance on how to"add"security to service oriented solutions based on Web services and XML technology is already considerable and ever growing. The present book sets a di?erent focus. Based on the p- adigmof Model Driven Security, it shows how to systematically designand realize security-critical applications for Service Oriented Architectures.

Canadian Semantic Web - Technologies and Applications (Hardcover, 2010 ed.): Weichang Du, Faezeh Ensan Canadian Semantic Web - Technologies and Applications (Hardcover, 2010 ed.)
Weichang Du, Faezeh Ensan
R4,479 Discovery Miles 44 790 Ships in 10 - 15 working days

The emergence of Web technologies for the distribution of an immense amount of data and knowledge has given rise to the need for supportive frameworks for kno- edge management. Semantic Web technologies aim at providing shared semantic spaces for Web contents, such that people, applications and communities can use a common platform to share information. Canadian Semantic Web: Technologies and Applications aims at contributing to the advancement of the Semantic Web by providing the most recent signi?cant - search on Semantic Web theory, techniques and applications in academia, industry and government in Canada and all over the world. It also enlightens possible - mantic Web research directions in future by reporting some works in-progress that presenton-goingresearchonprinciplesandapplicationsoftheSemanticWeb, while their implementation or deployment may have not been completed. This book consists of ten chapters. The chapters are extended versions of a - lected set of papers from the second Canadian Semantic Web Working Symposium (CSWWS 2009) and the twenty-?rst international Conference on Software En- neering and Knowledge Engineering (SEKE 2009). CSWWS 2009 was held in Kelowna, British Columbia in May 2009. Since many of the challenging aspects of the research problems tackled in the Semantic Web area fall in the realm of Ar- ?cial Intelligence or employ of AI techniques, CSWWS 2009 was organized in - nd sociation with the 22 Canadian Conference on Arti?cial Intelligence

Algebraic Aspects of Cryptography (Hardcover, 1st ed. 1998. Corr. 3rd printing 2004): Neal Koblitz Algebraic Aspects of Cryptography (Hardcover, 1st ed. 1998. Corr. 3rd printing 2004)
Neal Koblitz; Appendix by A.J. Menezes, Y.-H. Wu, R.J. Zuccherato
R5,209 Discovery Miles 52 090 Ships in 10 - 15 working days

This is a textbook for a course (or self-instruction) in cryptography with emphasis on algebraic methods. The first half of the book is a self-contained informal introduction to areas of algebra, number theory, and computer science that are used in cryptography. Most of the material in the second half - "hidden monomial" systems, combinatorial-algebraic systems, and hyperelliptic systems - has not previously appeared in monograph form. The Appendix by Menezes, Wu, and Zuccherato gives an elementary treatment of hyperelliptic curves. This book is intended for graduate students, advanced undergraduates, and scientists working in various fields of data security.

Analysis, Retrieval and Delivery of Multimedia Content (Hardcover, 2013 ed.): Nicola Adami, Andrea Cavallaro, Riccardo... Analysis, Retrieval and Delivery of Multimedia Content (Hardcover, 2013 ed.)
Nicola Adami, Andrea Cavallaro, Riccardo Leonardi, Pierangelo Migliorati
R4,383 Discovery Miles 43 830 Ships in 10 - 15 working days

Covering some of the most cutting-edge research on the delivery and retrieval of interactive multimedia content, this volume of specially chosen contributions provides the most updated perspective on one of the hottest contemporary topics. The material represents extended versions of papers presented at the 11th International Workshop on Image Analysis for Multimedia Interactive Services, a vital international forum on this fast-moving field. Logically organized in discrete sections that approach the subject from its various angles, the content deals in turn with content analysis, motion and activity analysis, high-level descriptors and video retrieval, 3-D and multi-view, and multimedia delivery. The chapters cover the finest detail of emerging techniques such as the use of high-level audio information in improving scene segmentation and the use of subjective logic for forensic visual surveillance. On content delivery, the book examines both images and video, focusing on key subjects including an efficient pre-fetching strategy for JPEG 2000 image sequences. Further contributions look at new methodologies for simultaneous block reconstruction and provide a trellis-based algorithm for faster motion-vector decision making.

Wireless and Mobile Networking - IFIP Joint Conference on Mobile Wireless Communications Networks (MWCN'2008) and Personal... Wireless and Mobile Networking - IFIP Joint Conference on Mobile Wireless Communications Networks (MWCN'2008) and Personal Wireless Communications (PWC'2008), Toulouse, France, September 30 - October 2, 2008 (Hardcover, 2008 ed.)
Zoubir Mammeri
R4,639 Discovery Miles 46 390 Ships in 10 - 15 working days

Research and development in wireless and mobile networks and services areas have been going on for some time, reaching the stage of products. Graceful evo- tion of networks, new access schemes, flexible protocols, increased variety of services and applications, networks reliability and availability, security, are some of the present and future challenges that have to be met. MWCN (Mobile and Wireless Communications Networks) and PWC (Personal Wireless Communications) are two conferences sponsored by IFIP WG 6.8 that provide forum for discussion between researchers, practitioners and students interested in new developments in mobile and wireless networks, services, applications and computing. In 2008, MWCN and PWC were held in Toulouse, France, from September 30 to October 2, 2008. MWNC'2008 and PWC'2008 were coupled to form the first edition of IFIP Wireless and Mobile Networking Conference (WMNC'2008). MWCN and PWC topics were revisited in order to make them complementary and covering together the main hot issues in wireless and mobile networks, services, applications, computing, and technologies.

Data-Driven Techniques in Speech Synthesis (Hardcover, 2001 ed.): R.I. Damper Data-Driven Techniques in Speech Synthesis (Hardcover, 2001 ed.)
R.I. Damper
R4,542 Discovery Miles 45 420 Ships in 10 - 15 working days

This first review of a new field covers all areas of speech synthesis from text, ranging from text analysis to letter-to-sound conversion. At the leading edge of current research, the concise and accessible book is written by well respected experts in the field.

Web Mining and Social Networking - Techniques and Applications (Hardcover, 2011 Ed.): Guandong Xu, Yanchun Zhang, Lin Li Web Mining and Social Networking - Techniques and Applications (Hardcover, 2011 Ed.)
Guandong Xu, Yanchun Zhang, Lin Li
R3,002 Discovery Miles 30 020 Ships in 10 - 15 working days

This book examines the techniques and applications involved in the Web Mining, Web Personalization and Recommendation and Web Community Analysis domains, including a detailed presentation of the principles, developed algorithms, and systems of the research in these areas. The applications of web mining, and the issue of how to incorporate web mining into web personalization and recommendation systems are also reviewed. Additionally, the volume explores web community mining and analysis to find the structural, organizational and temporal developments of web communities and reveal the societal sense of individuals or communities.

The volume will benefit both academic and industry communities interested in the techniques and applications of web search, web data management, web mining and web knowledge discovery, as well as web community and social network analysis.

Handbook on Knowledge Management 2 - Knowledge Directions (Hardcover, 2003 ed.): Clyde Holsapple Handbook on Knowledge Management 2 - Knowledge Directions (Hardcover, 2003 ed.)
Clyde Holsapple
R6,035 Discovery Miles 60 350 Ships in 10 - 15 working days

As the most comprehensive reference work dealing with knowledge management (KM), this work is essential for the library of every KM practitioner, researcher, and educator. Written by an international array of KM luminaries, its approx. 60 chapters approach knowledge management from a wide variety of perspectives ranging from classic foundations to cutting-edge thought, informative to provocative, theoretical to practical, historical to futuristic, human to technological, and operational to strategic. The chapters are conveniently organized into 8 major sections. The second volume consists of the sections: technologies for knowledge management, outcomes of KM, knowledge management in action, and the KM horizon. Novices and experts alike will refer to the authoritative and stimulating content again and again for years to come.

Video Bioinformatics - From Live Imaging to Knowledge (Hardcover, 1st ed. 2015): Bir Bhanu, Prue Talbot Video Bioinformatics - From Live Imaging to Knowledge (Hardcover, 1st ed. 2015)
Bir Bhanu, Prue Talbot
R4,330 R3,760 Discovery Miles 37 600 Save R570 (13%) Ships in 12 - 19 working days

The advances of live cell video imaging and high-throughput technologies for functional and chemical genomics provide unprecedented opportunities to understand how biological processes work in subcellularand multicellular systems. The interdisciplinary research field of Video Bioinformatics is defined by BirBhanu as the automated processing, analysis, understanding, data mining, visualization, query-basedretrieval/storage of biological spatiotemporal events/data and knowledge extracted from dynamic imagesand microscopic videos. Video bioinformatics attempts to provide a deeper understanding of continuousand dynamic life processes.Genome sequences alone lack spatial and temporal information, and video imaging of specific moleculesand their spatiotemporal interactions, using a range of imaging methods, are essential to understandhow genomes create cells, how cells constitute organisms, and how errant cells cause disease. The bookexamines interdisciplinary research issues and challenges with examples that deal with organismal dynamics,intercellular and tissue dynamics, intracellular dynamics, protein movement, cell signaling and softwareand databases for video bioinformatics.Topics and Features* Covers a set of biological problems, their significance, live-imaging experiments, theory andcomputational methods, quantifiable experimental results and discussion of results.* Provides automated methods for analyzing mild traumatic brain injury over time, identifying injurydynamics after neonatal hypoxia-ischemia and visualizing cortical tissue changes during seizureactivity as examples of organismal dynamics* Describes techniques for quantifying the dynamics of human embryonic stem cells with examplesof cell detection/segmentation, spreading and other dynamic behaviors which are important forcharacterizing stem cell health* Examines and quantifies dynamic processes in plant and fungal systems such as cell trafficking,growth of pollen tubes in model systems such as Neurospora Crassa and Arabidopsis* Discusses the dynamics of intracellular molecules for DNA repair and the regulation of cofilintransport using video analysis* Discusses software, system and database aspects of video bioinformatics by providing examples of5D cell tracking by FARSIGHT open source toolkit, a survey on available databases and software,biological processes for non-verbal communications and identification and retrieval of moth imagesThis unique text will be of great interest to researchers and graduate students of Electrical Engineering,Computer Science, Bioengineering, Cell Biology, Toxicology, Genetics, Genomics, Bioinformatics, ComputerVision and Pattern Recognition, Medical Image Analysis, and Cell Molecular and Developmental Biology.The large number of example applications will also appeal to application scientists and engineers.Dr. Bir Bhanu is Distinguished Professor of Electrical & C omputer Engineering, Interim Chair of theDepartment of Bioengineering, Cooperative Professor of Computer Science & Engineering, and MechanicalEngineering and the Director of the Center for Research in Intelligent Systems, at the University of California,Riverside, California, USA.Dr. Prue Talbot is Professor of Cell Biology & Neuroscience and Director of the Stem Cell Center and Core atthe University of California Riverside, California, USA.

Neural Network Data Analysis Using Simulnet (TM) (Hardcover): Edward J. Rzempoluck Neural Network Data Analysis Using Simulnet (TM) (Hardcover)
Edward J. Rzempoluck
R1,551 Discovery Miles 15 510 Ships in 10 - 15 working days

This book and sofwtare package provide a complement to the traditional data analysis tools already widely available. It presents an introduction to the analysis of data using neural networks. Neural network functions discussed include multilayer feed-forward networks using error back propagation, genetic algorithm-neural network hybrids, generalized regression neural networks, learning quantizer networks, and self-organizing feature maps. In an easy-to-use, Windows-based environment it offers a wide range of data analytic tools which are not usually found together: these include genetic algorithms, probabilistic networks, as well as a number of related techniques that support these - notably, fractal dimension analysis, coherence analysis, and mutual information analysis. The text presents a number of worked examples and case studies using Simulnet, the software package which comes with the book. Readers are assumed to have a basic understanding of computers and elementary mathematics. With this background, a reader will find themselves quickly conducting sophisticated hands-on analyses of data sets.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Epigenetic Principles of Evolution
Nelson R Cabej Paperback R4,526 R3,771 Discovery Miles 37 710
Falling Monuments, Reluctant Ruins - The…
Hilton Judin Paperback R395 R365 Discovery Miles 3 650
A Day in Code - An illustrated story…
Shari Eskenas Hardcover R610 Discovery Miles 6 100
Handbook on Space, Place and Law
Robyn Bartel, Jennifer Carter Paperback R1,503 Discovery Miles 15 030
Mechatronic Components - Roadmap to…
Emin Faruk Kececi Paperback R2,993 Discovery Miles 29 930
Ion Beams in Materials Processing and…
Bernd Schmidt, Klaus Wetzig Hardcover R5,141 Discovery Miles 51 410
Smart City - How to Create Public and…
Renata Paola Dameri, Camille Rosenthal-Sabroux Hardcover R2,890 Discovery Miles 28 900
Divatastic Be's A Girl's Guidebook to…
Nancy Franklin-Wright Hardcover R591 Discovery Miles 5 910
Raspberry Pi - Raspberry Pi programming…
Craig Newport Hardcover R598 R542 Discovery Miles 5 420
Magneto-Active Polymers - Fabrication…
Jean-Paul Pelteret, Paul Steinmann Hardcover R4,621 Discovery Miles 46 210

 

Partners