|
Books > Computing & IT > General theory of computing
RDF-based knowledge graphs require additional formalisms to be
fully context-aware, which is presented in this book. This book
also provides a collection of provenance techniques and
state-of-the-art metadata-enhanced, provenance-aware, knowledge
graph-based representations across multiple application domains, in
order to demonstrate how to combine graph-based data models and
provenance representations. This is important to make statements
authoritative, verifiable, and reproducible, such as in biomedical,
pharmaceutical, and cybersecurity applications, where the data
source and generator can be just as important as the data itself.
Capturing provenance is critical to ensure sound experimental
results and rigorously designed research studies for patient and
drug safety, pathology reports, and medical evidence generation.
Similarly, provenance is needed for cyberthreat intelligence
dashboards and attack maps that aggregate and/or fuse heterogeneous
data from disparate data sources to differentiate between
unimportant online events and dangerous cyberattacks, which is
demonstrated in this book. Without provenance, data reliability and
trustworthiness might be limited, causing data reuse, trust,
reproducibility and accountability issues. This book primarily
targets researchers who utilize knowledge graphs in their methods
and approaches (this includes researchers from a variety of
domains, such as cybersecurity, eHealth, data science, Semantic
Web, etc.). This book collects core facts for the state of the art
in provenance approaches and techniques, complemented by a critical
review of existing approaches. New research directions are also
provided that combine data science and knowledge graphs, for an
increasingly important research topic.
This open access book presents selected papers from International
Symposium on Mathematics, Quantum Theory, and Cryptography (MQC),
which was held on September 25-27, 2019 in Fukuoka, Japan. The
international symposium MQC addresses the mathematics and quantum
theory underlying secure modeling of the post quantum cryptography
including e.g. mathematical study of the light-matter interaction
models as well as quantum computing. The security of the most
widely used RSA cryptosystem is based on the difficulty of
factoring large integers. However, in 1994 Shor proposed a quantum
polynomial time algorithm for factoring integers, and the RSA
cryptosystem is no longer secure in the quantum computing model.
This vulnerability has prompted research into post-quantum
cryptography using alternative mathematical problems that are
secure in the era of quantum computers. In this regard, the
National Institute of Standards and Technology (NIST) began to
standardize post-quantum cryptography in 2016. This book is
suitable for postgraduate students in mathematics and computer
science, as well as for experts in industry working on post-quantum
cryptography.
Inverse problems such as imaging or parameter identification deal
with the recovery of unknown quantities from indirect observations,
connected via a model describing the underlying context. While
traditionally inverse problems are formulated and investigated in a
static setting, we observe a significant increase of interest in
time-dependence in a growing number of important applications over
the last few years. Here, time-dependence affects a) the unknown
function to be recovered and / or b) the observed data and / or c)
the underlying process. Challenging applications in the field of
imaging and parameter identification are techniques such as
photoacoustic tomography, elastography, dynamic computerized or
emission tomography, dynamic magnetic resonance imaging,
super-resolution in image sequences and videos, health monitoring
of elastic structures, optical flow problems or magnetic particle
imaging to name only a few. Such problems demand for innovation
concerning their mathematical description and analysis as well as
computational approaches for their solution.
This book presents a summary of artificial intelligence and machine
learning techniques in its first two chapters. The remaining
chapters of the book provide everything one must know about the
basic artificial intelligence to modern machine intelligence
techniques including the hybrid computational intelligence
technique, using the concepts of several real-life solved examples,
design of projects and research ideas. The solved examples with
more than 200 illustrations presented in the book are a great help
to instructors, students, non-AI professionals, and researchers.
Each example is discussed in detail with encoding, normalization,
architecture, detailed design, process flow, and sample
input/output. Summary of the fundamental concepts with solved
examples is a unique combination and highlight of this book.
The world is changing at a fast pace, so is the Government and
Governance style. Humans are bound to go for Algorithmic strategies
rather than manual or electronic ones in different domains. This
book introduces the Algorithmic Government or Government by
Algorithm, which refers to authorizing machines in the Public
Sector for automated decision-making based on Artificial
Intelligence, Data Science, and other technologies. It is an
emerging concept introduced globally and will be considered
revolutionary in the future. The book covers concepts,
applications, progress status, and potential use-cases of
Algorithmic Government. This book serves as introductory material
for the readers from technology, public policy, administration, and
management fields.
An Address Book Designed for Social Media Lovers, Bloggers,
YouTubers, Entrepreneurs, Business Professionals and anyone who
uses the Internet every day. Created by YouTuber and Blogger,
Sherry Adepitan. Record Internet Usernames and Passwords, Website
Addresses and Additional Information. Never forget another
Password.
Note: This is the second printing. It contains all of the
corrections as of May 2017 as well as an updated back cover. Roger
Wagner's Assembly Lines articles originally appeared in Softalk
magazine from October 1980 to June 1983. The first fifteen articles
were reprinted in 1982 in Assembly Lines: The Book. Now, for the
first time, all thirty-three articles are available in one complete
volume. This edition also contains all of the appendices from the
original book as well as new appendices on the 65C02, zero-page
memory usage, and a beginner's guide to using the Merlin Assembler.
The book is designed for students of all ages: the nostalgic
programmer enjoying the retro revolution, the newcomer interested
in learning low-level assembly coding, or the embedded systems
developer using the latest 65C02 chips from Western Design Center.
"Roger Wagner didn't just read the first book on programming the
Apple computer-he wrote it." - Steve Wozniak
This book highlights essential concepts in connection with the
traditional bat algorithm and its recent variants, as well as its
application to find optimal solutions for a variety of real-world
engineering and medical problems. Today, swarm intelligence-based
meta-heuristic algorithms are extensively being used to address a
wide range of real-world optimization problems due to their
adaptability and robustness. Developed in 2009, the bat algorithm
(BA) is one of the most successful swarm intelligence procedures,
and has been used to tackle optimization tasks for more than a
decade. The BA's mathematical model is quite straightforward and
easy to understand and enhance, compared to other swarm approaches.
Hence, it has attracted the attention of researchers who are
working to find optimal solutions in a diverse range of domains,
such as N-dimensional numerical optimization,
constrained/unconstrained optimization and linear/nonlinear
optimization problems. Along with the traditional BA, its enhanced
versions are now also being used to solve optimization problems in
science, engineering and medical applications around the globe.
As adult learners and educators pioneer the use of technology in
the new century, attention has been focused on developing strategic
approaches to effectively integrate adult learning and technology
in different learning environments. Integrating Adult Learning and
Technologies for Effective Education: Strategic Approaches provides
innovative instructional approaches as well as relevant theoretical
frameworks and the latest empirical research findings in the area
of adult learning and technology. This compelling body of research
aids professionals in improving instructional training strategies
to educate traditional and non-traditional students in today's
information age.
Technology has become profoundly integrated into modern society;
however, this increases the risk of vulnerabilities, such as
hacking and other system errors, along with other online threats.
Security, Privacy, and Anonymization in Social Networks: Emerging
Research and Opportunities is a pivotal reference source for the
most up-to-date research on edge clustering models and weighted
social networks. Presenting widespread coverage across a range of
applicable perspectives and topics, such as neighborhood attacks,
fast k-degree anonymization (FKDA), and vertex-clustering
algorithms, this book is ideally designed for academics,
researchers, post-graduates, and practitioners seeking current
research on undirected networks and greedy algorithms for social
network anonymization.
New innovations of online learning within blended environments
create a need within academia for research on best practices in
teaching. ""Effective Blended Learning Practices: Evidence-Based
Perspectives in ICT-Facilitated Education"" provides insight into
the practice of blended learning in higher education. This unique
book collects new international research into many aspects of
blended learning from the perspectives of learners, teachers,
designers, and professional and academic developers in various
disciplines, learning communities, and universities from around the
world.
Advances in machine learning techniques and ever-increasing
computing power has helped create a new generation of hardware and
software technologies with practical applications for nearly every
industry. As the progress has, in turn, excited the interest of
venture investors, technology firms, and a growing number of
clients, implementing intelligent automation in both physical and
information systems has become a must in business. Handbook of
Research on Smart Technology Models for Business and Industry is an
essential reference source that discusses relevant abstract
frameworks and the latest experimental research findings in theory,
mathematical models, software applications, and prototypes in the
area of smart technologies. Featuring research on topics such as
digital security, renewable energy, and intelligence management,
this book is ideally designed for machine learning specialists,
industrial experts, data scientists, researchers, academicians,
students, and business professionals seeking coverage on current
smart technology models.
CSS Programming Professional Made Easy 2nd Edition: Expert CSS
Programming Language Success in a Day for any Computer User! Do you
know why CSS programming will save you time over any other
programming language? Do you know why CSS programming loads pages
faster? Do you know why using CSS has multiple device
compatibilities? Need to learn CSS Selectors & association
styles? What are the CSS Measurement Units? Need everything on
colours, fonts, and background programming with CSS? Get right into
it with all the answers provided with just one click!
In a global, highly competitive environment, organizations face
increasing economic pressure and customer demands for more complex
products and services. Hybrid algorithms have the potential to play
an important role in helping organizations achieve cost reduction
and increased product development. Hybrid Algorithms for Service,
Computing and Manufacturing Systems: Routing and Scheduling
Solutions explores research developments and applications from an
interdisciplinary perspective that combines approaches from
operations research, computer science, artificial intelligence, and
applied computational mathematics. Contributions cover a range of
hybrid algorithm theory and practice as it relates to routing,
scheduling, and real-life applications.
For courses in engineering and technical management System
architecture is the study of early decision making in complex
systems. This text teaches how to capture experience and analysis
about early system decisions, and how to choose architectures that
meet stakeholder needs, integrate easily, and evolve flexibly. With
case studies written by leading practitioners, from hybrid cars to
communications networks to aircraft, this text showcases the
science and art of system architecture.
Our revision resources are the smart choice for those revising for
externally assessed Component 3 in the Digital Information
Technology BTEC Tech Award. This book contains four full-length
practice assessments, helping you to: Prepare by familiarising
yourself with the structure and process for completing your
assessment Practice by writing responses straight into the book
Perfect your external assessment skills, with targeted hints,
guidance and support for evvery question, along with answers.
Revision is more than Practice Assessments! Make sure you have
revised all the essential content for this unit and know what good
responses look like with the accompanying Revise BTEC Tech Award
Digital Information Technology Revision Guide. Look out for links
to the Revision Guide for further information as you work through
these practice assessments.
This book discusses various applications of machine learning using
a new approach, the dynamic wavelet fingerprint technique, to
identify features for machine learning and pattern classification
in time-domain signals. Whether for medical imaging or structural
health monitoring, it develops analysis techniques and measurement
technologies for the quantitative characterization of materials,
tissues and structures by non-invasive means. Intelligent Feature
Selection for Machine Learning using the Dynamic Wavelet
Fingerprint begins by providing background information on machine
learning and the wavelet fingerprint technique. It then progresses
through six technical chapters, applying the methods discussed to
particular real-world problems. Theses chapters are presented in
such a way that they can be read on their own, depending on the
reader's area of interest, or read together to provide a
comprehensive overview of the topic. Given its scope, the book will
be of interest to practitioners, engineers and researchers seeking
to leverage the latest advances in machine learning in order to
develop solutions to practical problems in structural health
monitoring, medical imaging, autonomous vehicles, wireless
technology, and historical conservation.
We live in an increasingly interconnected and highly sophisticated
society, where the Internet has led to tremendous improvements in
the efficiency and effectiveness of public services. The Handbook
of Research on E-Services in the Public Sector: E-Government
Strategies and Advancements illustrates how technology in
e-government saves individuals significant amounts of time and
money, while adding value to citizens' experiences with government,
thus better serving their needs. This handbook provides
comprehensive coverage of the issues facing managers, consultants,
and practitioners in e-government and assists them in formulating
ICT strategies for use within their field. These new strategies
will enable them to implement collaborative policy initiatives
within the private, public, and non-profit sectors to ultimately
eliminate the global digital divide.
|
You may like...
The Printmaker
Bronwyn Law-Viljoen
Hardcover
R300
R270
Discovery Miles 2 700
|