![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Applications of computing > General
Soft computing techniques are widely used in most businesses. This book consists of several important papers on the applications of soft computing techniques for the business field. The soft computing techniques used in this book include (or very closely related to): Bayesian networks, biclustering methods, case-based reasoning, data mining, Dempster-Shafer theory, ensemble learning, evolutionary programming, fuzzy decision trees, hidden Markov models, intelligent agents, k-means clustering, maximum likelihood Hebbian learning, neural networks, opportunistic scheduling, probability distributions combined with Monte Carlo methods, rough sets, self organizing maps, support vector machines, uncertain reasoning, other statistical and machine learning techniques, and combinations of these techniques. The businesses or business problems addressed in this book include (or very closely related to): analysis of correlations between currency exchange rates, analysis of USA banks and Moody s bank financial strength rating, arrears management, business risk identification, company audit fee evaluation, dental treatments, business internal control, intelligent tutoring systems and educational assessment, modeling agent behavior, motor insurance industry, personal loan defaults, pricing strategies for increasing the market share, pricing strategies in supply chain management, probabilistic sales forecasting, user relevance feedback analysis for online text retrieval, and world crude oil spot price forecasting."
Discusses digital fashion design and e-prototyping, including 2D/3D CAD, fashion simulation, fit analysis, digital pattern cutting, marker making, and the zero-waste concept Covers digital human modelling and VR/AR technology Details digital fashion business and promotion, including application of e-tools for supply chain, e-commerce, block chain technologies, big data, and AI
Discusses digital fashion design and e-prototyping, including 2D/3D CAD, fashion simulation, fit analysis, digital pattern cutting, marker making, and the zero-waste concept Covers digital human modelling and VR/AR technology Details digital fashion business and promotion, including application of e-tools for supply chain, e-commerce, block chain technologies, big data, and AI
This volume provides the basis for contemporary privacy and social media research and informs global as well as local initiatives to address issues related to social media privacy through research, policymaking, and education. Renowned scholars in the fields of communication, psychology, philosophy, informatics, and law look back on the last decade of privacy research and project how the topic will develop in the next decade. The text begins with an overview of key scholarship in online privacy, expands to focus on influential factors shaping privacy perceptions and behaviors-such as culture, gender, and trust-and continues with specific examinations of concerns around vulnerable populations such as children and older adults. It then looks at how privacy is managed and the implications of interacting with artificial intelligence, concluding by discussing feasible solutions to some of the more pressing questions surrounding online privacy. This handbook will be a valuable resource for advanced students, scholars, and policymakers in the fields of communication studies, digital media studies, psychology, and computer science.
The School of Photography: Beginner's Guide will take the beginner photographer to an advanced level in no time and fill any gaps in photography knowledge that may be holding you back from reaching your full potential. You'll be able to use your camera confidently in all the manual modes and apply the knowledge gained to any situation. The book will make you feel completely confident and ensure your shots stack up against any professional-looking photography. It's for people who want to take photography more seriously and will suit beginners, keen enthusiasts or anyone looking to make photography their profession. This book will put an end to any confusion, while giving you accurate and thorough knowledge in photography. Topics covered include: - Camera kits and equipment - Working in manual settings - Composition - Apertures and depth of field - Shutter speeds - Night photography
This monograph, for the first time in book form, considers the large structure of metric spaces as captured by bornologies: families of subsets that contain the singletons, that are stable under finite unions, and that are stable under taking subsets of its members. The largest bornology is the power set of the space and the smallest is the bornology of its finite subsets. Between these lie (among others) the metrically bounded subsets, the relatively compact subsets, the totally bounded subsets, and the Bourbaki bounded subsets. Classes of functions are intimately connected to various bornologies; e.g., (1) a function is locally Lipschitz if and only if its restriction to each relatively compact subset is Lipschitz; (2) a subset is Bourbaki bounded if and only if each uniformly continuous function on the space is bounded when restricted to the subset. A great deal of attention is given to the variational notions of strong uniform continuity and strong uniform convergence with respect to the members of a bornology, leading to the bornology of UC-subsets and UC-spaces. Spaces on which its uniformly continuous real-valued functions are stable under pointwise product are characterized in terms of the coincidence of the Bourbaki bounded subsets with a usually larger bornology. Special attention is given to Lipschitz and locally Lipschitz functions. For example, uniformly dense subclasses of locally Lipschitz functions within the real-valued continuous functions, Cauchy continuous functions, and uniformly continuous functions are presented. It is shown very generally that a function between metric spaces has a particular metric property if and only if whenever it is followed in a composition by a real-valued Lipschitz function, the composition has the property. Bornological convergence of nets of closed subsets, having Attouch-Wets convergence as a prototype, is considered in detail. Topologies of uniform convergence for continuous linear operators between normed spaces is explained in terms of the bornological convergence of their graphs. Finally, the idea of a bornological extension of a topological space is presented, and all regular extensions can be so realized.
China's Belt and Road Initiatives (BRI) is an ambitious infrastructure project conceived in 2013 by President Xi Jinping with development and investment initiatives stretching from Asia and Europe that reflect the original Silk Road with business networks through countries such as Afghanistan, Kazakhstan, Kyrgyzstan, Tajikistan, Turkmenistan, and Uzbekistan, as well as India and Pakistan, spanning a route of more than four thousand miles and history that can be dated back more than 2200 years. Given the background of China's unique approach in fighting the COVID-19, and against the backdrop of sluggish economic growth, innovation and management within the sustainable development of BRI will be the key and the driving force for the post-pandemic economic recovery for many countries, especially when BRI countries now accounts for nearly 30% of China's foreign trade and 15% of outward direct investment. The vision to create a vast network of railways, energy pipelines, highways, and streamlined border crossings to expand the international use of Chinese currency and improve connectivity to China is good foresight and fortuitous with COVID-19 pandemic came to plague the world, and amid in the conflicts between US and China as well as a War between Russia and Ukraine. Since the inception of BRI many books are written to cover topics ranging from globalization to detailing how China's business and politics as a major motivation for China's overseas economic activities with case studies and practices, yet seldom of these books provide structured approach to the sustainable management of BRI projects. This book is about how to manage innovation, sustainability, and business necessary to make BRI works, and how to handle the issues, problems and crisis that may arise thereof. Participants of BRI projects can take many different roles but ultimately it is team effort and leadership for each project. Here the readers will find guidelines and insights to survive and prosper in a myriad of BRI opportunities and risks. Most important of all, this book provides a glimpse of different approach for success in BRI projects, including sustainability, environmental issues, social and political aspects, technological, choice of industry, project management, education and training, governance and many more.
Is your enterprise architecture making a difference? Does it contribute to the goals of your company? Are the architects your best paid employees? If you are striving for a full-hearted yes to these questions, this is the book for you. Building an Enterprise Architecture Practice provides practical advice on how to develop your enterprise architecture practice. The authors developed different tools and models to support organizations in implementing and professionalizing an enterprise architecture function. The application of these tools and models in many different organizations forms the basis for this book. The result is a hands-on book that will help you to avoid certain pitfalls and achieve success with enterprise architecture. A lot of organizations nowadays have a team of enterprise architects at work but struggle with questions like: a [ How do I show the added value of enterprise architecture? a [ How do I determine what specific architectures are necessary for my organization? a [ What steps do I need to take to improve my enterprise architecture practice? a [ How do I fulfill the role of enterprise architect? These questions are answered in this book and illustrated with a lot of best practices. After reading the book the reader will have a better understanding of what makes enterprise architecture successful and will possess the tools to analyse his own situation and build an enterprise architecture practice accordingly. ---------------------------------------------------------------------------------------------------- This book clearly describes how to establish an architecture practice that delivers value for an organization. The authorsdemonstrate a wealth of experience and a deep understanding of the multifaceted nature of this challenging task and they provide sound advice on how to avoid the many pitfalls that may be encountered along the way. Recognising that there is no 'one-size-fits-all' approach, they show how to deploy a range of practical tools and approaches that will enable each organization to create its own road map to success. In particular, their Maturity Matrix is invaluable for balancing architecture priorities and targeting improvements. The book makes a significant contribution to the professionalization of the architect role. Sally Bean, Enterprise Architecture Consultant ---------------------------------------------------------------------------------------------------- Too many books on enterprise architecture leave one in a state of mental fuzziness: After reading them, the reader has learned a lot of impressive words but still does not know how to design an enterprise architecture. This step by step guide to DYA is different. It provides pragmatic guidelines for developing enterprise architecture and presents a maturity model that helps the users of DYA to state realistic goals and to outline feasible steps to achieve these goals. Particularly useful is the emphasis on a coherent enterprise architecture vision, including the value added by the architecture. I warmly recommend this book to practicing enterprise architects. Prof. Dr. Roel Wieringa, Universiteit Twente
This book presents the proceedings of The EAI International Conference on Computer Science: Applications in Engineering and Health Services (COMPSE 2019). The conference highlighted the latest research innovations and applications of algorithms designed for optimization applications within the fields of Science, Computer Science, Engineering, Information Technology, Management, Finance and Economics and Health Systems. Focusing on a variety of methods and systems as well as practical examples, this conference is a significant resource for post graduate-level students, decision makers, and researchers in both public and private sectors who are seeking research-based methods for modelling uncertain and unpredictable real-world problems.
1. The book will begin by evaluating the state of the art of all Internet Of behaviors (IoB) while looking into their BI, Big Data, CDPs, etc. core building block 2. Offers in-depth examination of Internet Of behaviors, which supports 3. Includes handy quick-reference to help readers with regular with simple language rules; 4. This book goal is to record, analyse, comprehend, and respond to all forms of human behaviour in a way that allows people to be tracked and interpreted using developing technology advancements and advances in machine learning algorithms
The study of the brain and behavior is illuminated with the discovery of invariances. Experimental brain research uncovers constancies amidst variation, with respect to interventions and transformations prescribed by experimental paradigms. Place cells, mirror neurons, event related potentials and areas differentially active in fMRI, all illustrate the pervasive role of invariances in neural systems in relation to their function.
Cybersecurity risk is a top-of-the-house issue for all organizations. Cybertax-Managing the Risks and Results is a must read for every current or aspiring executive seeking the best way to manage and mitigate cybersecurity risk. It examines cybersecurity as a tax on the organization and charts the best ways leadership can be cybertax efficient. Viewing cybersecurity through the cybertax lens provides an effective way for non-cybersecurity experts in leadership to manage and govern cybersecurity in their organizations The book outlines questions and leadership techniques to gain the relevant information to manage cybersecurity threats and risk. The book enables executives to: Understand cybersecurity risk from a business perspective Understand cybersecurity risk as a tax (cybertax) Understand the cybersecurity threat landscape Drive business-driven questions and metrics for managing cybersecurity risk Understand the Seven C's for managing cybersecurity risk Governing the cybersecurity function is as important as governing finance, sales, human resources, and other key leadership responsibilities Executive leadership needs to manage cybersecurity risk like they manage other critical risks, such as sales, finances, resources, and competition. This book puts managing cybersecurity risk on an even plane with these other significant risks that demand leader ships' attention. The authors strive to demystify cybersecurity to bridge the chasm from the top-of-the-house to the cybersecurity function. This book delivers actionable advice and metrics to measure and evaluate cybersecurity effectiveness across your organization.
More frequent and complex cyber threats require robust, automated and rapid responses from cyber security specialists. This book offers a complete study in the area of graph learning in cyber, emphasising graph neural networks (GNNs) and their cyber security applications. Three parts examine the basics; methods and practices; and advanced topics. The first part presents a grounding in graph data structures and graph embedding and gives a taxonomic view of GNNs and cyber security applications. Part two explains three different categories of graph learning including deterministic, generative and reinforcement learning and how they can be used for developing cyber defence models. The discussion of each category covers the applicability of simple and complex graphs, scalability, representative algorithms and technical details. Undergraduate students, graduate students, researchers, cyber analysts, and AI engineers looking to understand practical deep learning methods will find this book an invaluable resource.
More frequent and complex cyber threats require robust, automated and rapid responses from cyber security specialists. This book offers a complete study in the area of graph learning in cyber, emphasising graph neural networks (GNNs) and their cyber security applications. Three parts examine the basics; methods and practices; and advanced topics. The first part presents a grounding in graph data structures and graph embedding and gives a taxonomic view of GNNs and cyber security applications. Part two explains three different categories of graph learning including deterministic, generative and reinforcement learning and how they can be used for developing cyber defence models. The discussion of each category covers the applicability of simple and complex graphs, scalability, representative algorithms and technical details. Undergraduate students, graduate students, researchers, cyber analysts, and AI engineers looking to understand practical deep learning methods will find this book an invaluable resource.
This book introduces readers to a reconfigurable chip architecture for future wireless communication systems, such as 5G and beyond. The proposed architecture perfectly meets the demands for future mobile communication solutions to support different standards, algorithms, and antenna sizes, and to accommodate the evolution of standards and algorithms. It employs massive MIMO detection algorithms, which combine the advantages of low complexity and high parallelism, and can fully meet the requirements for detection accuracy. Further, the architecture is implemented using ASIC, which offers high energy efficiency, high area efficiency and low detection error. After introducing massive MIMO detection algorithms and circuit architectures, the book describes the ASIC implementation for verifying the massive MIMO detection. In turn, it provides detailed information on the proposed reconfigurable architecture: the data path and configuration path for massive MIMO detection algorithms, including the processing unit, interconnections, storage mechanism, configuration information format, and configuration method.
Electrical Engineering Electric Power Applications of Fuzzy Systems Let world-renowned electrical engineers introduce you to the latest developments in the application of one of the fastest growing artificial intelligence techniques for power systems--fuzzy system theory. Compiled and edited by well-known power systems educator Mohamed E. El-Hawary, Electric Power Applications of Fuzzy Systems assembles a distinguished panel of highly regarded experts to bring you original, up-to-date coverage of the applications of fuzzy systems. This volume presents theoretical background material from a practical point of view and then explores a number of applications of fuzzy systems. Each chapter features an informative introduction. Look for succinct, practical discussions on:
Research and development of logic synthesis and verification have matured considerably over the past two decades. Many commercial products are available, and they have been critical in harnessing advances in fabrication technology to produce today's plethora of electronic components. While this maturity is assuring, the advances in fabrication continue to seemingly present unwieldy challenges. Logic Synthesis and Verification provides a state-of-the-art view of logic synthesis and verification. It consists of fifteen chapters, each focusing on a distinct aspect. Each chapter presents key developments, outlines future challenges, and lists essential references. Two unique features of this book are technical strength and comprehensiveness. The book chapters are written by twenty-eight recognized leaders in the field and reviewed by equally qualified experts. The topics collectively span the field. Logic Synthesis and Verification fills a current gap in the existing CAD literature. Each chapter contains essential information to study a topic at a great depth, and to understand further developments in the field. The book is intended for seniors, graduate students, researchers, and developers of related Computer-Aided Design (CAD) tools. From the foreword: "The commercial success of logic synthesis and verification is due in large part to the ideas of many of the authors of this book. Their innovative work contributed to design automation tools that permanently changed the course of electronic design." by Aart J. de Geus, Chairman and CEO, Synopsys, Inc.
Mobile biometrics - the use of physical and/or behavioral characteristics of humans to allow their recognition by mobile/smart phones - aims to achieve conventional functionality and robustness while also supporting portability and mobility, bringing greater convenience and opportunity for its deployment in a wide range of operational environments from consumer applications to law enforcement. But achieving these aims brings new challenges such as issues with power consumption, algorithm complexity, device memory limitations, frequent changes in operational environment, security, durability, reliability, and connectivity. Mobile Biometrics provides a timely survey of the state of the art research and developments in this rapidly growing area. Topics covered in Mobile Biometrics include mobile biometric sensor design, deep neural network for mobile person recognition with audio-visual signals, active authentication using facial attributes, fusion of shape and texture features for lip biometry in mobile devices, mobile device usage data as behavioral biometrics, continuous mobile authentication using user phone interaction, smartwatch-based gait biometrics, mobile four-fingers biometrics system, palm print recognition on mobile devices, periocular region for smartphone biometrics, and face anti-spoofing on mobile devices.
Whether the source is more industry-based or academic research, there certainly appears to be a growing interest in the field of cryptocurrency. The New York Times had a cover story on March 24, 2022, titled "Time to Enter the Crypto Zone?," and they talked about institutional investors pouring billions into digital tokens, salaries being taken in Bitcoins, and even Bitcoin ATMs in grocery stores. Certainly, there have been ups and downs in crypto, but it has a kind of alluring presence that tempts one to include crypto as part of one’s portfolio. Those who are "prime crypto-curious" investors are usually familiar with the tech/pop culture and feel they want to diversify a bit in this fast-moving market. Even universities are beginning to offer more courses and create "Centers on Cryptocurrency." Some universities are even requiring their students who take a crypto course to pay the course tuition via cryptocurrency. In response to the growing interest and fascination about the crypto industry and cryptocurrency in general, Cryptocurrency Concepts, Technology, and Applications brings together many leading worldwide contributors to discuss a broad range of issues associated with cryptocurrency. The book covers a wide array of crypto-related topics, including: Blockchain NFTs Data analytics and AI Crypto crime Crypto industry and regulation Crypto and public choice Consumer confidence Bitcoin and other cryptocurrencies. Presenting various viewpoints on where the crypto industry is heading, this timely book points out both the advantages and limitations of this emerging field. It is an easy-to-read, yet comprehensive, overview of cryptocurrency in the U.S. and international markets.
Whether the source is more industry-based or academic research, there certainly appears to be a growing interest in the field of cryptocurrency. The New York Times had a cover story on March 24, 2022, titled "Time to Enter the Crypto Zone?," and they talked about institutional investors pouring billions into digital tokens, salaries being taken in Bitcoins, and even Bitcoin ATMs in grocery stores. Certainly, there have been ups and downs in crypto, but it has a kind of alluring presence that tempts one to include crypto as part of one’s portfolio. Those who are "prime crypto-curious" investors are usually familiar with the tech/pop culture and feel they want to diversify a bit in this fast-moving market. Even universities are beginning to offer more courses and create "Centers on Cryptocurrency." Some universities are even requiring their students who take a crypto course to pay the course tuition via cryptocurrency. In response to the growing interest and fascination about the crypto industry and cryptocurrency in general, Cryptocurrency Concepts, Technology, and Applications brings together many leading worldwide contributors to discuss a broad range of issues associated with cryptocurrency. The book covers a wide array of crypto-related topics, including: Blockchain NFTs Data analytics and AI Crypto crime Crypto industry and regulation Crypto and public choice Consumer confidence Bitcoin and other cryptocurrencies. Presenting various viewpoints on where the crypto industry is heading, this timely book points out both the advantages and limitations of this emerging field. It is an easy-to-read, yet comprehensive, overview of cryptocurrency in the U.S. and international markets.
Cybersecurity risk is a top-of-the-house issue for all organizations. Cybertax-Managing the Risks and Results is a must read for every current or aspiring executive seeking the best way to manage and mitigate cybersecurity risk. It examines cybersecurity as a tax on the organization and charts the best ways leadership can be cybertax efficient. Viewing cybersecurity through the cybertax lens provides an effective way for non-cybersecurity experts in leadership to manage and govern cybersecurity in their organizations The book outlines questions and leadership techniques to gain the relevant information to manage cybersecurity threats and risk. The book enables executives to: Understand cybersecurity risk from a business perspective Understand cybersecurity risk as a tax (cybertax) Understand the cybersecurity threat landscape Drive business-driven questions and metrics for managing cybersecurity risk Understand the Seven C's for managing cybersecurity risk Governing the cybersecurity function is as important as governing finance, sales, human resources, and other key leadership responsibilities Executive leadership needs to manage cybersecurity risk like they manage other critical risks, such as sales, finances, resources, and competition. This book puts managing cybersecurity risk on an even plane with these other significant risks that demand leader ships' attention. The authors strive to demystify cybersecurity to bridge the chasm from the top-of-the-house to the cybersecurity function. This book delivers actionable advice and metrics to measure and evaluate cybersecurity effectiveness across your organization.
Digital Intermediation offers a new framework for understanding content creation and distribution across automated media platforms - a new mediatisation process. The book draws on empirical and theoretical research to carefully identify and describe a number of unseen digital infrastructures that contribute to a predictive media production process through technologies, institutions and automation. Field data is drawn from several international sites, including Los Angeles, San Francisco, Portland, London, Amsterdam, Munich, Berlin, Hamburg, Sydney and Cartagena. By highlighting an increasingly automated content production and distribution process, the book responds to a number of regulatory debates on the societal impact of social media platforms. It highlights emerging areas of key importance that shape the production and distribution of social media content, including micro-platformization and digital first personalities. The book explains how technologies, institutions and automation are used within agencies to increase exposure for the talent they manage, while providing inside access to the processes and requirements of producers who create content for platform algorithms. Finally, it outlines user agency as a strategy for those who seek diversity in the information they access on automated social media content distribution platforms. The findings in this book provide key recommendations for policymakers working within digital media platforms, and will be invaluable reading for students and academics interested in automated media environments. |
You may like...
Petroleum Related Rock Mechanics, Volume…
Erling Fjaer, Rune Martin Holt, …
Paperback
R3,965
Discovery Miles 39 650
The Medical Aspects of Mustard gas…
Aldred Scott Warthin, Carl Vernon Well
Hardcover
R866
Discovery Miles 8 660
Iberia, Land of Glaciers - How The…
Marc Oliva, David Palacios, …
Paperback
R3,342
Discovery Miles 33 420
Proceedings of the American Association…
Assoc for the Advancement of Science
Hardcover
R732
Discovery Miles 7 320
Introductory Dynamical Oceanography
Stephen Pond, George L. Pickard
Paperback
R1,346
Discovery Miles 13 460
Hydrocarbon Fluid Inclusions in…
Vivekanandan Nandakumar, J.L. Jayanthi
Paperback
R3,485
Discovery Miles 34 850
Arms Control Policy - A Guide to the…
Marie Isabelle Chevrier
Hardcover
|