![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Reference & Interdisciplinary > Communication studies > Information theory > General
This book constitutes the proceedings of the 17th Conference on Computability in Europe, CiE 2021, organized by the University of Ghent in July 2021. Due to COVID-19 pandemic the conference was held virtually. The 48 full papers presented in this volume were carefully reviewed and selected from 50 submissions. CiE promotes the development of computability-related science, ranging over mathematics, computer science and applications in various natural and engineering sciences, such as physics and biology, as well as related fields, such as philosophy and history of computing. CiE 2021 had as its motto Connecting with Computability, a clear acknowledgement of the connecting and interdisciplinary nature of the conference series which is all the more important in a time where people are more than ever disconnected from one another due to the COVID-19 pandemic.
This book constitutes revised selected papers from the workshops of the 4th Asia-Pacific Web and Web-Age Information Management International Joint Conference on Web and Big Data, APWeb-WAIM 2020: The Third International Workshop on Knowledge Graph Management and Applications, KGMA 2020; The Second International Workshop on Semi-structured Big Data Management and Applications, SemiBDMA 2020, and The First International Workshop on Deep Learning in Large-scale Unstructured Data Analytics, DeepLUDA 2020, held in Tianjin, China, in September 2020. Due to the COVID-19 pandemic the conference was held online. The 13 papers were thoroughly reviewed and selected from the numerous submissions and present recent research on the theory, design, and implementation of data management systems.
This book provides a comprehensive explanation of forward error correction, which is a vital part of communication systems. The book is written in such a way to make the subject easy and understandable for the reader. The book starts with a review of linear algebra to provide a basis for the text. The author then goes on to cover linear block codes, syndrome error correction, cyclic codes, Galois fields, BCH codes, Reed Solomon codes, and convolutional codes. Examples are provided throughout the text.
This book constitutes the refereed proceedings of the First International Workshop on Cyber-Physical Security for Critical Infrastructures Protection, CPS4CIP 2020, which was organized in conjunction with the European Symposium on Research in Computer Security, ESORICS 2020, and held online on September 2020.The 14 full papers presented in this volume were carefully reviewed and selected from 24 submissions. They were organized in topical sections named: security threat intelligence; data anomaly detection: predict and prevent; computer vision and dataset for security; security management and governance; and impact propagation and power traffic analysis. The book contains 6 chapters which are available open access under a CC-BY license.
This book constitutes selected papers of the Second International Conference on Advanced Communication Systems and Information Security, ACOSIS 2019, held in Marrakesh, Morocco, in November 2019. The 10 full papers and 10 short papers were thoroughly reviewed and selected from 94 submissions. The papers are organized accroding to the following topical sections: wireless communications and services; vehicular communications; channel coding; construction of error correcting codes; intrusion detection techniques; wireless and mobile network security; applied cryptography.
Algorithms play a central role both in the theory and in the practice of computing. The goal of the authors was to write a textbook that would not trivialize the subject but would still be readable by most students on their own. The book contains over 120 exercises. Some of them are drills; others make important points about the material covered in the text or introduce new algorithms not covered there. The book also provides programming projects. From the Table of Contents: Chapter 1: Basic knowledge of Mathematics, Relations, Recurrence relation and Solution techniques, Function and Growth of functions. Chapter 2: Different Sorting Techniques and their analysis. Chapter 3: Greedy approach, Dynamic Programming, Branch and Bound techniques, Backtracking and Problems, Amortized analysis, and Order Statics. Chapter 4: Graph algorithms, BFS, DFS, Spanning Tree, Flow Maximization Algorithms. Shortest Path Algorithms. Chapter 5: Binary search tree, Red black Tree, Binomial heap, B-Tree and Fibonacci Heap. Chapter 6: Approximation Algorithms, Sorting Networks, Matrix operations, Fast Fourier Transformation, Number theoretic Algorithm, Computational geometry Randomized Algorithms, String matching, NP-Hard, NP-Completeness, Cooks theorem.
Intelligence results from the interaction of the brain, body and environment. The question addressed in this book is, can we measure the contribution of the body and its' interaction with the environment? To answer this, we first present a comprehensive overview of the various ways in which a body reduces the amount of computation that the brain has to perform to solve a task. This chapter will broaden your understanding of how important inconspicuously appearing physical processes and physical properties of the body are with respect to our cognitive abilities. This form of contribution to intelligence is called Morphological Intelligence. The main contribution of this book to the field is a detailed discussion of how Morphological Intelligence can be measured from observations alone. The required mathematical framework is provided so that readers unfamiliar with information theory will be able to understand and apply the measures. Case studies from biomechanics and soft robotics illustrate how the presented quantifications can, for example, be used to measure the contribution of muscle physics to jumping and optimise the shape of a soft robotic hand. To summarise, this monograph presents various examples of how the physical properties of the body and the body's interaction with the environment contribute to intelligence. Furthermore, it treats theoretical and practical aspects of Morphological Intelligence and demonstrates the value in two case studies.
This book constitutes the refereed post-conference proceedings of two conferences: The 8th EAI International Conference on ArtsIT, Interactivity and Game Creation (ArtsIT 2019), and the 4th EAI International Conference on Design, Learning, and Innovation (DLI 2019). Both conferences were hosed in Aalborg, Denmark, and took place November 6-8, 2019. The 61 revised full papers presented were carefully selected from 98 submissions. The papers represent a forum for the dissemination of cutting-edge research results in the area of arts, design and technology, including open related topics like interactivity and game creation.
This two-volume set LNCS 12205 and LNCS 12206 constitutes the proceedings of the 7th International Conference on Learning and Collaboration Technologies, LCT 2020, held as part of the 22nd International Conference, HCI International 2020, which took place in Copenhagen, Denmark, in July 2020. The total of 1439 papers and 238 posters included in the 37 HCII 2020 proceedings volumes was carefully reviewed and selected from 6326 submissions. The papers in this volume are organized in the following topical sections: designing and evaluating learning experiences; learning analytics, dashboards and learners models; language learning and teaching; and technology in education: policies and practice. As a result of the Danish Government's announcement, dated April 21, 2020, to ban all large events (above 500 participants) until September 1, 2020, the HCII 2020 conference was held virtually.
IT-Governance, Sarbanes-Oxley Act, Basel II: Information Lifecycle Management (ILM) ist ein Thema, das alle CIO's beherrschen m ssen. Die Autoren fassen Information als Produkt auf, das einem Lebenszyklus unterliegt. Jede Phase dieses Produktlebenszyklus erfordert andere IT-Methoden, um Information kostenbewusst zu speichern, sowie zu be- und verarbeiten. Die Autoren erl utern die Gesetzeslage, Klassifizierungs- und Sicherheitskonzepte sowie deren Anforderungen an Betriebsf hrung und Unternehmen. Ausf hrlich: Qualit ts- und Risikomanagement. Plus: Disaster Recovery als Bestandteil der Security-Strategie und Betrachtung der globalen Aspekte.
This three volume set (CCIS 1237-1239) constitutes the proceedings of the 18th International Conference on Information Processing and Management of Uncertainty in Knowledge-Based Systems, IPMU 2020, in June 2020. The conference was scheduled to take place in Lisbon, Portugal, at University of Lisbon, but due to COVID-19 pandemic it was held virtually. The 173 papers were carefully reviewed and selected from 213 submissions. The papers are organized in topical sections: homage to Enrique Ruspini; invited talks; foundations and mathematics; decision making, preferences and votes; optimization and uncertainty; games; real world applications; knowledge processing and creation; machine learning I; machine learning II; XAI; image processing; temporal data processing; text analysis and processing; fuzzy interval analysis; theoretical and applied aspects of imprecise probabilities; similarities in artificial intelligence; belief function theory and its applications; aggregation: theory and practice; aggregation: pre-aggregation functions and other generalizations of monotonicity; aggregation: aggregation of different data structures; fuzzy methods in data mining and knowledge discovery; computational intelligence for logistics and transportation problems; fuzzy implication functions; soft methods in statistics and data analysis; image understanding and explainable AI; fuzzy and generalized quantifier theory; mathematical methods towards dealing with uncertainty in applied sciences; statistical image processing and analysis, with applications in neuroimaging; interval uncertainty; discrete models and computational intelligence; current techniques to model, process and describe time series; mathematical fuzzy logic and graded reasoning models; formal concept analysis, rough sets, general operators and related topics; computational intelligence methods in information modelling, representation and processing.
This book constitutesselected, revised and extended papers of the 14th International Conference on Evaluation of Novel Approaches to Software Engineering, ENASE 2019, held in Heraklion, Crete, Greece, in May 2019. The 19 revised full papers presented were carefully reviewed and selected from 102 submissions. The papers included in this book contribute to the understanding of relevant trends of current research on novel approaches to software engineering for the development and maintenance of systems and applications, specically with relation to: model-driven software engineering, requirements engineering, empirical software engineering, service-oriented software engineering, business process management and engineering, knowledge management and engineering, reverse software engineering, software process improvement, software change and configuration management, software metrics, software patterns and refactoring, application integration, software architecture, cloud computing, and formal methods.
This book constitutes the refereed proceedings of the 14th International Conference on Algorithms and Computation, WALCOM 2020, held in Singapore in March/April 2020. The 23 full and 4 short papers presented were carefully reviewed and selected from 66 submissions. The papers focus on algorithmic graph theory and combinatorics, computational biology, computational geometry, data structures, experimental algorithm methodologies, graph algorithms, graph drawing, parallel and distributed algorithms, network optimization.
This book constitutes the 13th edition of the annual Multi-Agent Programming Contest, MAPC 2018, and presents its participants. The 2018 scenario and all its changes from previous competitions are described in the first contribution, together with a brief description and analysis of the five participating teams and a closer look at the matches. It is followed by a contribution from each team, introducing their methods and tools used to create their agent team and analyzing their performance and the contest.
The two-volume set LNCS 11442 and 11443 constitutes the refereed proceedings of the 22nd IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2019, held in Beijing, China, in April 2019. The 42 revised papers presented were carefully reviewed and selected from 173 submissions. They are organized in topical sections such as: Cryptographic Protocols; Digital Signatures; Zero-Knowledge; Identity-Based Encryption; Fundamental Primitives; Public Key Encryptions; Functional Encryption; Obfuscation Based Cryptography; Re- Encryption Schemes; Post Quantum Cryptography.
This book is written for anyone who is interested in how a field of research evolves and the fundamental role of understanding uncertainties involved in different levels of analysis, ranging from macroscopic views to meso- and microscopic ones. We introduce a series of computational and visual analytic techniques, from research areas such as text mining, deep learning, information visualization and science mapping, such that readers can apply these tools to the study of a subject matter of their choice. In addition, we set the diverse set of methods in an integrative context, that draws upon insights from philosophical, sociological, and evolutionary theories of what drives the advances of science, such that the readers of the book can guide their own research with their enriched theoretical foundations. Scientific knowledge is complex. A subject matter is typically built on its own set of concepts, theories, methodologies and findings, discovered by generations of researchers and practitioners. Scientific knowledge, as known to the scientific community as a whole, experiences constant changes. Some changes are long-lasting, whereas others may be short lived. How can we keep abreast of the state of the art as science advances? How can we effectively and precisely convey the status of the current science to the general public as well as scientists across different disciplines? The study of scientific knowledge in general has been overwhelmingly focused on scientific knowledge per se. In contrast, the status of scientific knowledge at various levels of granularity has been largely overlooked. This book aims to highlight the role of uncertainties, in developing a better understanding of the status of scientific knowledge at a particular time, and how its status evolves over the course of the development of research. Furthermore, we demonstrate how the knowledge of the types of uncertainties associated with scientific claims serves as an integral and critical part of our domain expertise.
Die Frage, ob das BGB den Herausforderungen der Digitalisierung noch gerecht werden kann, steht im Mittelpunkt dieser Publikation. Um dem auf den Grund zu gehen, untersucht der Autor den Begriff "digitale Inhalte", der seit Umsetzung der Verbraucherrechterichtlinie im BGB zu finden ist. Mithilfe einer Kategorisierung der Erscheinungsformen digitaler Inhalte ordnet er diese vertragstypologisch zu. Mit dem so gefundenen Ergebnis macht der Autor legislative Vorschlage fur eine alternative rechtliche Handhabbarkeit. Dabei nimmt er auch den von der Europaischen Kommission vorgelegten Vorschlag fur eine spezielle Richtlinie fur digitale Inhalte in den Blick und verbindet mit ihm die Zuversicht, dass es sich dabei um ein sinnvolles Update fur das BGB handeln koennte.
1. Lossless Coding.- 2.Universal Coding on Finite Alphabets.- 3.Universal Coding on Infinite Alphabets.- 4.Model Order Estimation.- Notation.- Index.
This textbook covers the theoretical backgrounds and practical aspects of image, video and audio feature expression, e.g., color, texture, edge, shape, salient point and area, motion, 3D structure, audio/sound in time, frequency and cepstral domains, structure and melody. Up-to-date algorithms for estimation, search, classification and compact expression of feature data are described in detail. Concepts of signal decomposition (such as segmentation, source tracking and separation), as well as composition, mixing, effects, and rendering, are discussed. Numerous figures and examples help to illustrate the aspects covered. The book was developed on the basis of a graduate-level university course, and most chapters are supplemented by problem-solving exercises. The book is also a self-contained introduction both for researchers and developers of multimedia content analysis systems in industry.
This book presents methods to improve information security for protected communication. It combines and applies interdisciplinary scientific engineering concepts, including cryptography, chaos theory, nonlinear and singular optics, radio-electronics and self-changing artificial systems. It also introduces additional ways to improve information security using optical vortices as information carriers and self-controlled nonlinearity, with nonlinearity playing a key "evolving" role. The proposed solutions allow the universal phenomenon of deterministic chaos to be discussed in the context of information security problems on the basis of examples of both electronic and optical systems. Further, the book presents the vortex detector and communication systems and describes mathematical models of the chaos oscillator as a coder in the synchronous chaotic communication and appropriate decoders, demonstrating their efficiency both analytically and experimentally. Lastly it discusses the cryptologic features of analyzed systems and suggests a series of new structures for confident communication.
This book gives a detailed survey of the main results on bent functions over finite fields, presents a systematic overview of their generalizations, variations and applications, considers open problems in classification and systematization of bent functions, and discusses proofs of several results. This book uniquely provides a necessary comprehensive coverage of bent functions.It serves as a useful reference for researchers in discrete mathematics, coding and cryptography. Students and professors in mathematics and computer science will also find the content valuable, especially those interested in mathematical foundations of cryptography. It can be used as a supplementary text for university courses on discrete mathematics, Boolean functions, or cryptography, and is appropriate for both basic classes for under-graduate students and advanced courses for specialists in cryptography and mathematics.
This book presents a comprehensive, structured, up-to-date survey on instruction selection. The survey is structured according to two dimensions: approaches to instruction selection from the past 45 years are organized and discussed according to their fundamental principles, and according to the characteristics of the supported machine instructions. The fundamental principles are macro expansion, tree covering, DAG covering, and graph covering. The machine instruction characteristics introduced are single-output, multi-output, disjoint-output, inter-block, and interdependent machine instructions. The survey also examines problems that have yet to be addressed by existing approaches. The book is suitable for advanced undergraduate students in computer science, graduate students, practitioners, and researchers.
This volume collects contributions written by different experts in honor of Prof. Jaime Munoz Masque. It covers a wide variety of research topics, from differential geometry to algebra, but particularly focuses on the geometric formulation of variational calculus; geometric mechanics and field theories; symmetries and conservation laws of differential equations, and pseudo-Riemannian geometry of homogeneous spaces. It also discusses algebraic applications to cryptography and number theory. It offers state-of-the-art contributions in the context of current research trends. The final result is a challenging panoramic view of connecting problems that initially appear distant. |
You may like...
Encyclopedia of Information Science and…
Mehdi Khosrow-Pour, D.B.A.
Hardcover
R20,967
Discovery Miles 209 670
Encyclopedia of Information Science and…
Mehdi Khosrow-Pour, D.B.A.
Hardcover
R20,954
Discovery Miles 209 540
Encyclopedia of Information Science and…
Mehdi Khosrow-Pour, D.B.A.
Hardcover
R20,961
Discovery Miles 209 610
Engineering and the Ultimate - An…
Jonathan Bartlett, Dominic Halsmer, …
Hardcover
R701
Discovery Miles 7 010
Progress in Communication Sciences…
Franklin J. Bostner, George Barnett
Hardcover
|