0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (164)
  • R250 - R500 (627)
  • R500+ (10,322)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > General

Computer-Assisted Career Decision Making - The Guide in the Machine (Hardcover): Martin R. Katz Computer-Assisted Career Decision Making - The Guide in the Machine (Hardcover)
Martin R. Katz
R4,271 Discovery Miles 42 710 Ships in 12 - 19 working days

Discussing career decision making (CDM), career guidance, a computerized system of career guidance, and the interplay among them, this book describes the way people sort themselves, or are sorted, into educational and occupational options. The options represent the content of this book, and the sorting represents the process. The sequence of decisions may extend over a lifetime, but several crucial choice-points tend to occur at predictable stages in a career. Career guidance is a professional intervention in CDM; "professional" implies that practitioners conform to a standard of ethics, knowledge, and competence beyond what may be offered by other intervenors. Guidance is partly an art, but it is also partly a science -- at least an application of science, based on a synthesis of logic and evidence derived from research.
The computerized "System of Interactive Guidance and Information" (SIGI) is a designated guidance "treatment," clearly defined and specified. It was developed according to an explicit model, derived from a particular rationale for guidance, using modern technology to amplify the practice of career guidance. The current version -- called SIGI PLUS TM -- is being used at more than a thousand colleges and universities, as well as secondary schools, libraries, corporations, community-based organizations, and counseling agencies.
These three interdependent topics are treated in a progression: from a theory of CDM to a rationale and a model for guidance to the design and development of a system. This book weaves together theory (principles, propositions, rationales, and models), research and development. The product of that development, SIGI, helps to definetheory, to exemplify it, and to test it.

Hybrid Intelligent Systems - Analysis and Design (Hardcover, 2007 ed.): Oscar Castillo, Patricia Melin, Witold Pedrycz Hybrid Intelligent Systems - Analysis and Design (Hardcover, 2007 ed.)
Oscar Castillo, Patricia Melin, Witold Pedrycz
R4,692 Discovery Miles 46 920 Ships in 10 - 15 working days

The objective of this edited volume is to offer a general view at the recent conceptual developments of Soft Computing (SC) regarded as a general methodology supporting the design of hybrid systems along with their diversified applications to modeling, simulation and control of non-linear dynamical systems. As of now, SC methodologies embrace neural networks, fuzzy logic, genetic algorithms and chaos theory. Each of these methodologies exhibits well delineated advantages and disadvantages. Interestingly, they have been found useful in solving a broad range of problems. However, many real-world complex problems require a prudent, carefully orchestrated integration of several of these methodologies to fully achieve the required efficiency, accuracy, and interpretability of the solutions. In this edited volume, an overview of SC methodologies, and their applications to modeling, simulation and control, will be given in an introductory paper by the Editors. Then, detailed methods for integrating the different SC methodologies in solving real-world problems will be given in the papers by the other authors in the book. The edited volume will cover a wide spectrum of applications including areas such as: robotic dynamic systems, non-linear plants, manufacturing systems, and time series prediction.

Multi-Criteria Methods for Alternative Dispute Resolution - With Microcomputer Software Applications (Hardcover, New): Stuart... Multi-Criteria Methods for Alternative Dispute Resolution - With Microcomputer Software Applications (Hardcover, New)
Stuart S. Nagel, Miriam K. Mills
R2,933 Discovery Miles 29 330 Ships in 10 - 15 working days

This work examines the topic of dispute resolution, specifically the multi-criteria approach that seeks to arrive at a conclusion that is mutually beneficial to both sides. Through the use of decision-aiding software, the multi-criteria approach can allow each side to give on various criteria that are not important to it, but are important to the other side. In this way, a super-optimum solution may even be met, in which both sides receive something significantly better than they had expected. Such a result is very difficult, if not impossible, to achieve, Stuart Nagel points out, in traditional single-dimension dispute resolution.

Nagel and Mills describe the nature of multi-criteria dispute resolution utilizing decision-aiding software. The first part of the book clarifies the general character of computer-aided negotiation, computer-aided mediation, and super-optimizing dispute resolution. Part two guides the reader through the use of Policy/Goal Percentaging (P/G%) decision-aiding software, centering on general decision-making, negotiation, mediation, and prediction of outcomes. Multi-criteria resolution in the context of rule-making and legal policy disputes is the focus of part three, where such matters as determining initial alternatives and criteria, resolving deadlocks, and arriving at super-optimum solutions are discussed. Part four emphasizes dispute resolution in the context of rule-applying and litigation disputes, as well as mediation at the international level and between lawyers and clients. The final part deals with future applications, such as computer-aided mediation and group decision-making with phone modems. The book's combination of decision-aiding software, arbitration-mediation, and super-optimum expansionist decision-making brings a truly innovative approach to the topic of dispute resolution. This volume should be a welcome addition to academic, legal, and public libraries, and a valuable reference work for lawyers, law students, and legal professors and researchers.

Proceedings of the First Donegani Scientific Workshop on Strategies for Computer Chemistry - October 12-13, 1987 (Hardcover,... Proceedings of the First Donegani Scientific Workshop on Strategies for Computer Chemistry - October 12-13, 1987 (Hardcover, 1989 ed.)
Camillo Tosi
R4,729 Discovery Miles 47 290 Ships in 12 - 19 working days

Cycloadditions are a very important class of reactions, which can be 1 used to obtain compounds of various ring sizes * Although these ,2 react? been largf: nvnntigated expnnivnntntit consi:fn ee f, :~oversy still fgeir mechanism, A reaction gene' ves the formaci new (J bonds between the reactants at the expense of n bonds. For such processes it is possible to postulate three different mechanisms: i) a synchron.ous concerted approach involving a cyclic transition state (TS) new bonds formed extent: ii)a neynchronous co:,:':" m:"chanism in whict fWO disticc to changes in e:f,me occurring the reactants and the single TS and the others mainly between the TS and products. iii) a two-step process, which occurs in two kinetically distinct steps via a ghnntical intermedintn Renect! gene computed the petential enerse or the ies of prototype tion reaction:f 4a i) the [2+2] cycloadditions H2C=CH2 + H C=CH , H C=O + H C=O,':b 2 2 2 2 H2 = 2 + O=O:4c C CH ii) the 1,3 dipolar cycloaddition HCNO + HC=CH, HCNO + H2C=CH2, H2CNHO 4d + H2C=CHd' 4e iii) cgdoaddition H C=CH * 2 2 have been potential enenpd th (STO-3G)5 ab-ini techniques f:ntcnged (4-31G)6 basis sets. All critical points have been fully optimized 7 using MC-SCF gradient techniques and characterized by diagonalizing 35 the related Hessian matrices computed using finite differences.

Tetrobot - A Modular Approach to Reconfigurable Parallel Robotics (Hardcover, 1998 ed.): Gregory J. Hamlin, Arthur C. Sanderson Tetrobot - A Modular Approach to Reconfigurable Parallel Robotics (Hardcover, 1998 ed.)
Gregory J. Hamlin, Arthur C. Sanderson
R4,688 Discovery Miles 46 880 Ships in 10 - 15 working days

Robotic systems are characterized by the intersection of computer intelligence with the physical world. This blend of physical reasoning and computational intelligence is well illustrated by the Tetrobot study described in this book. Tetrobot: A Modular Approach to Reconfigurable Parallel Robotics describes a new approach to the design of robotic systems. The Tetrobot approach utilizes modular components which may be reconfigured into many different mechanisms which are suited to different applications. The Tetrobot system includes two unique contributions: a new mechanism (a multilink spherical joint design), and a new control architecture based on propagation of kinematic solutions through the structure. The resulting Tetrobot system consists of fundamental components which may be mechanically reassembled into any modular configuration, and the control architecture will provide position control of the resulting structure. A prototype Tetrobot system has been built and evaluated experimentally. Tetrobot arms, platforms, and walking machines have been built and controlled in a variety of motion and loading conditions. The Tetrobot system has applications in a variety of domains where reconfiguration, flexibility, load capacity, and failure recovery are important aspects of the task. A number of key research directions have been opened by the Tetrobot research activities. Continuing topics of interest include: development of a more distributed implementation of the computer control architecture, analysis of the dynamics of the Tetrobot system motion for improved control of high-speed motions, integration of sensor systems to control the motion and shape of the high-dimensionality systems, and exploration of self-reconfiguration of the system. Tetrobot: A Modular Approach to Reconfigurable Parallel Robotics will be of interest to research workers, specialists and professionals in the areas of robotics, mechanical systems and computer engineering.

VLSI Design Methodologies for Digital Signal Processing Architectures (Hardcover, 1994 ed.): Magdy A. Bayoumi VLSI Design Methodologies for Digital Signal Processing Architectures (Hardcover, 1994 ed.)
Magdy A. Bayoumi
R6,122 Discovery Miles 61 220 Ships in 10 - 15 working days

Designing VLSI systems represents a challenging task. It is a transfonnation among different specifications corresponding to different levels of design: abstraction, behavioral, stntctural and physical. The behavioral level describes the functionality of the design. It consists of two components; static and dynamic. The static component describes operations, whereas the dynamic component describes sequencing and timing. The structural level contains infonnation about components, control and connectivity. The physical level describes the constraints that should be imposed on the floor plan, the placement of components, and the geometry of the design. Constraints of area, speed and power are also applied at this level. To implement such multilevel transfonnation, a design methodology should be devised, taking into consideration the constraints, limitations and properties of each level. The mapping process between any of these domains is non-isomorphic. A single behavioral component may be transfonned into more than one structural component. Design methodologies are the most recent evolution in the design automation era, which started off with the introduction and subsequent usage of module generation especially for regular structures such as PLA's and memories. A design methodology should offer an integrated design system rather than a set of separate unrelated routines and tools. A general outline of a desired integrated design system is as follows: * Decide on a certain unified framework for all design levels. * Derive a design method based on this framework. * Create a design environment to implement this design method.

Simulation Modelling - Concepts, Tools and Practical Business Applications (Paperback): Andrew Greasley Simulation Modelling - Concepts, Tools and Practical Business Applications (Paperback)
Andrew Greasley
R1,278 Discovery Miles 12 780 Ships in 9 - 17 working days

While simulation has a vast area of application, this textbook focuses on the use of simulation to analyse business processes. It provides an up-to-date coverage of all stages of the discrete-event simulation (DES) process, covering important areas such as conceptual modelling, modelling input data, verification and validation and simulation output analysis. The book is comprehensive yet uncomplicated, covering the theoretical aspects of the subject and the practical elements of a typical simulation project, demonstrated by cases, examples and exercises. It also shows how simulation relates to new developments in machine learning, big data analytics and conceptual modelling techniques. Guidance is provided on how to build DES models using the Arena, Simio and Simul8 simulation software, and tutorials for using the software are incorporated throughout. Simulation Modelling offers a uniquely practical and end-to-end overview of the subject, which makes it perfect required or recommended reading for advanced undergraduate and postgraduate students studying business simulation and simulation modelling as part of operations research, business analytics, supply chain management and computer science courses.

Petri Nets for Modeling of Large Discrete Systems (Hardcover, 1st ed. 2021): Reggie Davidrajuh Petri Nets for Modeling of Large Discrete Systems (Hardcover, 1st ed. 2021)
Reggie Davidrajuh
R4,324 Discovery Miles 43 240 Ships in 12 - 19 working days

This book offers a new Modular Petri Net as a solution to the vast Petri net models. It presents some approaches centering around modules (known as "Petri modules"). The goal of this book is to introduce a methodology in which Petri nets are moved to a new level. In this new level, large Petri net models are made of Petri modules, which are independent and run on different computers. This book also contains the literature study on modular Petri nets and definitions for the newer Petri modules. Also, algorithms for extracting Petri modules, and algorithms for connecting Petri modules, and applications are given in this book. Besides, the ideas and algorithms given in this book are implemented in the software General-purpose Petri Net Simulator (GPenSIM). Hence, with the use of this book the readers/users would be able to know that real-life discrete event systems could be modeled, analyzed, and performance-optimized with GPenSIM.

Discovering Computers  (c)2017 (Paperback, Enhanced Edition): Mark Frydenberg, Misty Vermaat, Susan Sebok, Steven Freund,... Discovering Computers (c)2017 (Paperback, Enhanced Edition)
Mark Frydenberg, Misty Vermaat, Susan Sebok, Steven Freund, Jennifer Campbell 3
R1,005 Discovery Miles 10 050 Ships in 2 - 4 working days

Teach students to maximize the use of mobile devices, make the most of online tools for collaboration and communications, and fully utilize today's Internet capabilities with the latest edition DISCOVERING COMPUTERS ENHANCED. Introductory computing students see how technology skills assist in employment and advancing careers. This edition highlights the most recent developments in computer tools and technology with new emphasis on Web Development, creating a strong web presence, and the latest Windows 10 information. To keep content as current as possible, online coverage of contemporary technology developments builds on the book's discussions.

The authors emphasize actionable content with a proven learning structure and practice to reinforce key skills. Self-assessments open each chapter, enabling learners to target study and learn more in less time. DISCOVERING COMPUTERS ENHANCED presents the content students need to succeed in a way that ensures understanding.

ISE Introduction to Programming with Java: A Problem Solving Approach (Paperback, 3rd edition): John Dean, Ray Dean ISE Introduction to Programming with Java: A Problem Solving Approach (Paperback, 3rd edition)
John Dean, Ray Dean
R1,894 Discovery Miles 18 940 Ships in 12 - 19 working days

Introduction to Programming with Java: A Problem Solving Approach teaches the reader how to write programs using Java. It does so with a unique approach that combines fundamentals first with objects early. The book transitions smoothly through a carefully selected set of procedural programming fundamentals to object-oriented fundamentals. During this early transition and beyond, the book emphasizes problem solving. For example, Chapter 2 is devoted to algorithm development, Chapter 8 is devoted to program design, and problem-solving sections appear throughout the book. The third edition introduces several new Java language features, most of the end-of-chapter GUI sections and the final GUI chapters use JavaFX, and almost all end-of-chapter exercises are new.

Cyber Security Threats and Challenges Facing Human Life (Hardcover): Hari Vasudevan, Surya S Durbha, Antonis Michalas,... Cyber Security Threats and Challenges Facing Human Life (Hardcover)
Hari Vasudevan, Surya S Durbha, Antonis Michalas, Tatwadarshi P Nagarhalli, Ramchandra Sharad Mangrulkar, …
R3,127 Discovery Miles 31 270 Ships in 9 - 17 working days

Cyber Security Threats and Challenges Facing Human Life provides a comprehensive view of the issues, threats, and challenges that are faced in the cyber security domain. This book offers detailed analysis of effective countermeasures and mitigations. The financial sector, healthcare, digital manufacturing, and social media are some of the important areas in which cyber-attacks are frequent and cause great harm. Hence, special emphasis is given to the study and analysis of cyber security challenges and countermeasures in those four important areas. KEY FEATURES * Discusses the prominence of cyber security in human life * Discusses the significance of cyber security in the post-COVID-19 world * Emphasizes the issues, challenges, and applications of cyber security mitigation methods in business and different sectors * Provides comphrension of the impact of cyber security threats and challenges in digital manufacturing and the internet of things environment * Offers understanding of the impact of big data breaches and future trends in data security This book is primarily aimed at undergraduate students, graduate students, researchers, academicians, and professionals who are interested in exploring their research and knowledge in cyber security domain.

A Formal Approach to Hardware Design (Hardcover, 1994 ed.): Jorgen Staunstrup A Formal Approach to Hardware Design (Hardcover, 1994 ed.)
Jorgen Staunstrup
R4,723 Discovery Miles 47 230 Ships in 10 - 15 working days

A Formal Approach to Hardware Design discusses designing computations to be realised by application specific hardware. It introduces a formal design approach based on a high-level design language called Synchronized Transitions. The models created using Synchronized Transitions enable the designer to perform different kinds of analysis and verification based on descriptions in a single language. It is, for example, possible to use exactly the same design description both for mechanically supported verification and synthesis. Synchronized Transitions is supported by a collection of public domain CAD tools. These tools can be used with the book in presenting a course on the subject. A Formal Approach to Hardware Design illustrates the benefits to be gained from adopting such techniques, but it does so without assuming prior knowledge of formal design methods. The book is thus not only an excellent reference, it is also suitable for use by students and practitioners.

Introductory Readings In Geographic Information Systems (Paperback): D. J. Peuquet, D. F. Marble Introductory Readings In Geographic Information Systems (Paperback)
D. J. Peuquet, D. F. Marble
R2,342 Discovery Miles 23 420 Ships in 12 - 19 working days

Although GIS has been in existence for over 20 years, the systems have only recently matured to the point where they have become accessible to geographers, planners, environmental scientists and others as an affordable and practical tool for spatial analysis. Much of the GIS literature is scattered over the journals and technical reports of a number of disciplines. These sources are often not widely available especially to the newcomer to the field. This text was assembled to bring together what we believe is a balanced sampling of written works that cover important aspects of the basic principles involved in GIS, as well as to provide some examples of GIS applications.

Modern Placement Techniques (Hardcover, 2002 ed.): Majid Sarrafzadeh, Maogang Wang, Xianjian Yang Modern Placement Techniques (Hardcover, 2002 ed.)
Majid Sarrafzadeh, Maogang Wang, Xianjian Yang
R3,142 Discovery Miles 31 420 Ships in 10 - 15 working days

Modern Placement Techniques explains physical design and VLSI/CAD placement to the professional engineer and engineering student. Along with explaining the problems that are associated with placement, the book gives an overview of existing placement algorithms, techniques and methodologies. Modern Placement Techniques emphasizes recent advances in addressing the placement problem, including congestion-driven, timing driven, mixed macro-cell and standard cell placement.
The book presents the Dragon placement tool, with detailed algorithm descriptions for wire length, congestion and timing optimization. Placement benchmarks and results produced by Dragon are explained in detail.

Exercises in Programming Style (Paperback, 2nd edition): Cristina Videira Lopes Exercises in Programming Style (Paperback, 2nd edition)
Cristina Videira Lopes
R1,245 Discovery Miles 12 450 Ships in 9 - 17 working days

The first edition of Exercises in Programming Style was honored as an ACM Notable Book and praised as "The best programming book of the decade." This new edition retains the same presentation but has been upgraded to Python 3, and there is a new section on neural network styles. Using a simple computational task (term frequency) to illustrate different programming styles, Exercises in Programming Style helps readers understand the various ways of writing programs and designing systems. It is designed to be used in conjunction with code provided on an online repository. The book complements and explains the raw code in a way that is accessible to anyone who regularly practices the art of programming. The book can also be used in advanced programming courses in computer science and software engineering programs. The book contains 40 different styles for writing the term frequency task. The styles are grouped into ten categories: historical, basic, function composition, objects and object interactions, reflection and metaprogramming, adversity, data-centric, concurrency, interactivity, and neural networks. The author states the constraints in each style and explains the example programs. Each chapter first presents the constraints of the style, next shows an example program, and then gives a detailed explanation of the code. Most chapters also have sections focusing on the use of the style in systems design as well as sections describing the historical context in which the programming style emerged.

Computation Engineering - Applied Automata Theory and Logic (Hardcover, 2006 ed.): Ganesh Gopalakrishnan Computation Engineering - Applied Automata Theory and Logic (Hardcover, 2006 ed.)
Ganesh Gopalakrishnan
R3,122 Discovery Miles 31 220 Ships in 12 - 19 working days

The computer hardware and software industry is committed to using formal methods. As a result, it is crucial that students who take automata theory and logic courses retain what they have learned and understand how to use their knowledge. Yet many textbooks typically emphasize automata theory only, not logic, thus losing a valuable opportunity to tie these subjects together and reinforce learning. In fact, automata theory and logic evolved hand-in-hand, yet this connection was severed in the '70s as separate automata-theory and logic courses became possible. Now, with computer science departments suffering from overcrowded syllabi, it is often possible for undergraduates to get a BS without having had to take a course in mathematical logic Today's students want to know how knowledge can work for them - learning theory as a tool is preferable to learning theory for theory's sake. To prove that theoretical tenents are not only applicable, but also necessary and relevant, useful examples must be presented. This textbook uses interactive tools throughout, such as simple BDD and SAT tools. shown to be both inviting and current. Topics are also illustrated in multiple domains so that information is reinforced and students can begin to tie theory and logic together. Having used this book, students will not only know and understand automata theory, but also be able to apply their knowledge in real practice.

Computational Intelligence - Engineering of Hybrid Systems (Hardcover, 2005 ed.): Mircea Gh. Negoita, Daniel Neagu, Vasile... Computational Intelligence - Engineering of Hybrid Systems (Hardcover, 2005 ed.)
Mircea Gh. Negoita, Daniel Neagu, Vasile Palade
R3,160 Discovery Miles 31 600 Ships in 10 - 15 working days

Hybrid Intelligent Systems has become an important research topic in computer science and a key application field in science and engineering. This book offers a gentle introduction to the engineering aspects of hybrid intelligent systems, also emphasizing the interrelation with the main intelligent technologies such as genetic algorithms evolutionary computation, neural networks, fuzzy systems, evolvable hardware, DNA computing, artificial immune systems. A unitary whole of theory and application, the book provides readers with the fundamentals, background information, and practical methods for building a hybrid intelligent system. It treats a panoply of applications, including many in industry, educational systems, forecasting, financial engineering, and bioinformatics. This volume is useful to newcomers in the field because it quickly familiarizes them with engineering elements of developing hybrid intelligent systems and a wide range of real applications, including non-industrial applications. Researchers, developers and technically oriented managers can use the book for developing both new hybrid intelligent systems approaches and new applications requiring the hybridization of the typical tools and concepts to computational intelligence."

Large-Scale Group Decision-Making - State-to-the-Art Clustering and Consensus Paths (Hardcover, 1st ed. 2022): Su-Min Yu,... Large-Scale Group Decision-Making - State-to-the-Art Clustering and Consensus Paths (Hardcover, 1st ed. 2022)
Su-Min Yu, Zhi-Jiao Du
R3,801 Discovery Miles 38 010 Ships in 10 - 15 working days

This book explores clustering operations in the context of social networks and consensus-reaching paths that take into account non-cooperative behaviors. This book focuses on the two key issues in large-scale group decision-making: clustering and consensus building. Clustering aims to reduce the dimension of a large group. Consensus reaching requires that the divergent individual opinions of the decision makers converge to the group opinion. This book emphasizes the similarity of opinions and social relationships as important measurement attributes of clustering, which makes it different from traditional clustering methods with single attribute to divide the original large group without requiring a combination of the above two attributes. The proposed consensus models focus on the treatment of non-cooperative behaviors in the consensus-reaching process and explores the influence of trust loss on the consensus-reaching process.The logic behind is as follows: firstly, a clustering algorithm is adopted to reduce the dimension of decision-makers, and then, based on the clusters' opinions obtained, a consensus-reaching process is carried out to obtain a decision result acceptable to the majority of decision-makers. Graduates and researchers in the fields of management science, computer science, information management, engineering technology, etc., who are interested in large-scale group decision-making and consensus building are potential audience of this book. It helps readers to have a deeper and more comprehensive understanding of clustering analysis and consensus building in large-scale group decision-making.

Computational Methods In Physics And Engineering (2nd Edition) (Hardcover, 2nd Revised edition): Samuel S. M Wong Computational Methods In Physics And Engineering (2nd Edition) (Hardcover, 2nd Revised edition)
Samuel S. M Wong
R2,350 Discovery Miles 23 500 Ships in 12 - 19 working days

Numerical methods are playing an ever-increasing role in physics and engineering. This is especially true after the recent explosion of computing power on the desk-top. This book is aimed at helping the user to make intelligent use of this power tool. Each method is introduced through realistic examples and actual computer programs. The explanations provide the background for making a choice between similar approaches and the knowledge to explore the network for the appropriate existing codes. Tedious proofs and derivations, on the other hand, are delegated to references. Examples of uncoventional methods are also given to stimulate readers in exploring new ways of solving problems.

Three Dimensional Applications In GIS (Hardcover): Jonathan Raper Three Dimensional Applications In GIS (Hardcover)
Jonathan Raper
R5,029 R1,870 Discovery Miles 18 700 Save R3,159 (63%) Ships in 12 - 19 working days

This study surveys the approaches used and problems encountered in the modelling of real geophysical data. It addresses key themes of the modelling process including the selection of reliable data, the choice of data structure and the objective analysis of 3-D information presented in the model.

Cybersecurity - An Essential Guide to Computer and Cyber Security for Beginners, Including Ethical Hacking, Risk Assessment,... Cybersecurity - An Essential Guide to Computer and Cyber Security for Beginners, Including Ethical Hacking, Risk Assessment, Social Engineering, Attack and Defense Strategies, and Cyberwarfare (Hardcover)
Lester Evans
R759 R666 Discovery Miles 6 660 Save R93 (12%) Ships in 10 - 15 working days
The EU Artificial Intelligence Act - Regulating Subliminal AI Systems (Hardcover): Rostam J. Neuwirth The EU Artificial Intelligence Act - Regulating Subliminal AI Systems (Hardcover)
Rostam J. Neuwirth
R1,765 Discovery Miles 17 650 Ships in 9 - 17 working days

AI in combination with other innovative technologies promises to bring unprecedented opportunities to all aspects of life. These technologies, however, hold great dangers, especially for the manipulation of the human mind, which have given rise to serious ethical concerns. Apart from some sectoral regulatory efforts to address these concerns, no regulatory framework for AI has yet been adopted though in 2021 the European Commission of the EU published a draft Act on Artificial Intelligence and UNESCO followed suit with a Recommendation on the Ethics of Artificial Intelligence. The book contextualises the future regulation of AI, specifically addressing the regulatory challenges relating to the planned prohibition of the use of AI systems that deploy subliminal techniques. The convergence of AI with various related technologies, such as brain-computer interfaces, functional magnetic resonance imaging, robotics and big data, already allows for "mind reading" or "dream hacking" through brain spyware, as well as other practices that intrude on cognition and the right to freedom of thought. Future innovations will enhance the possibilities for manipulating thoughts and behaviour, and they threaten to cause serious harm to individuals as well as to society as a whole. The issue of subliminal perception and the ability to deceive and manipulate the mind below the threshold of awareness causes severe difficulties for law and democracy and raises important questions for the future of society. This book shows how cognitive, technological, and legal questions are intrinsically interwoven, and aims to stimulate an urgently needed transdisciplinary and transnational debate between students, academics, practitioners, policymakers and citizens interested not only in the law but also in disciplines including computer science, neuroscience, sociology, political science, marketing and psychology.

Computer Science Unleashed - Harness the Power of Computational Systems (Hardcover): Wladston Ferreira Filho, Raimondo Pictet Computer Science Unleashed - Harness the Power of Computational Systems (Hardcover)
Wladston Ferreira Filho, Raimondo Pictet
R1,072 Discovery Miles 10 720 Ships in 10 - 15 working days
Cybersecurity for Everyone (Paperback): David B Skillicorn Cybersecurity for Everyone (Paperback)
David B Skillicorn
R756 Discovery Miles 7 560 Ships in 9 - 17 working days

Cyberspace is a critical part of our lives. Although we all use cyberspace for work, entertainment, and social life, much of its infrastructure and operation is invisible to us. We spend a big part of our lives in an environment that is almost an essential service but is full of potential dangers: a place where criminals can commit new kinds of crimes, where governments can exert political pressure, and where we can be hurt by the unthinking actions of the bored and careless. Making cyberspace more secure is one of the challenges of our times. This is not only (or perhaps even primarily) a technical challenge. It requires actions by governments and businesses to encourage security whenever possible, and to make sure that their own actions do not undermine it. Unfortunately, many of those in a position to do something about cybersecurity do not have the background to understand the issues fully. Cybersecurity for Everyone will help by describing the issues in a way that is accessible to anyone, but especially those from non-technical backgrounds.

Security Risk Models for Cyber Insurance (Paperback): Caroline Baylon, Jose Vila, David Rios Insua Security Risk Models for Cyber Insurance (Paperback)
Caroline Baylon, Jose Vila, David Rios Insua
R1,546 Discovery Miles 15 460 Ships in 9 - 17 working days

Tackling the cybersecurity challenge is a matter of survival for society at large. Cyber attacks are rapidly increasing in sophistication and magnitude-and in their destructive potential. New threats emerge regularly, the last few years having seen a ransomware boom and distributed denial-of-service attacks leveraging the Internet of Things. For organisations, the use of cybersecurity risk management is essential in order to manage these threats. Yet current frameworks have drawbacks which can lead to the suboptimal allocation of cybersecurity resources. Cyber insurance has been touted as part of the solution - based on the idea that insurers can incentivize companies to improve their cybersecurity by offering premium discounts - but cyber insurance levels remain limited. This is because companies have difficulty determining which cyber insurance products to purchase, and insurance companies struggle to accurately assess cyber risk and thus develop cyber insurance products. To deal with these challenges, this volume presents new models for cybersecurity risk management, partly based on the use of cyber insurance. It contains: A set of mathematical models for cybersecurity risk management, including (i) a model to assist companies in determining their optimal budget allocation between security products and cyber insurance and (ii) a model to assist insurers in designing cyber insurance products. The models use adversarial risk analysis to account for the behavior of threat actors (as well as the behavior of companies and insurers). To inform these models, we draw on psychological and behavioural economics studies of decision-making by individuals regarding cybersecurity and cyber insurance. We also draw on organizational decision-making studies involving cybersecurity and cyber insurance. Its theoretical and methodological findings will appeal to researchers across a wide range of cybersecurity-related disciplines including risk and decision analysis, analytics, technology management, actuarial sciences, behavioural sciences, and economics. The practical findings will help cybersecurity professionals and insurers enhance cybersecurity and cyber insurance, thus benefiting society as a whole. This book grew out of a two-year European Union-funded project under Horizons 2020, called CYBECO (Supporting Cyber Insurance from a Behavioral Choice Perspective).

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
GIS Applications in the Tourism and…
Somnath Chaudhuri, Nilanjan Ray Hardcover R5,798 Discovery Miles 57 980
High Performance Computing in Science…
Wolfgang E. Nagel, Dietmar H. Kroener, … Hardcover R5,973 Discovery Miles 59 730
Standards, Methods and Solutions of…
Luigi Cocco Hardcover R3,474 Discovery Miles 34 740
Recent Advances in Estimating Nonlinear…
Jun Ma, Mark Wohar Hardcover R3,992 R3,703 Discovery Miles 37 030
Small Flying Drones - Applications for…
Gianluca Casagrande, Andras Sik, … Hardcover R5,285 Discovery Miles 52 850
Sensor Systems Simulations - From…
Willem Dirk van Driel, Oliver Pyper, … Hardcover R3,622 Discovery Miles 36 220
Environmental Perception Technology for…
Xin Bi Hardcover R3,043 Discovery Miles 30 430
Geography's Quantitative Revolutions…
Elvin Wyly Hardcover R3,020 Discovery Miles 30 200
Risk-Based Engineering - An Integrated…
Prabhakar V. Varde, Michael G. Pecht Hardcover R3,919 Discovery Miles 39 190
Internet of Vehicles and its…
Nishu Gupta, Arun Prakash, … Hardcover R5,368 Discovery Miles 53 680

 

Partners