![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > General
Handbook of Human-Machine Systems Insightful and cutting-edge discussions of recent developments in human-machine systems In Handbook of Human-Machine Systems, a team of distinguished researchers delivers a comprehensive exploration of human-machine systems (HMS) research and development from a variety of illuminating perspectives. The book offers a big picture look at state-of-the-art research and technology in the area of HMS. Contributing authors cover Brain-Machine Interfaces and Systems, including assistive technologies like devices used to improve locomotion. They also discuss advances in the scientific and engineering foundations of Collaborative Intelligent Systems and Applications. Companion technology, which combines trans-disciplinary research in fields like computer science, AI, and cognitive science, is explored alongside the applications of human cognition in intelligent and artificially intelligent system designs, human factors engineering, and various aspects of interactive and wearable computers and systems. The book also includes: A thorough introduction to human-machine systems via the use of emblematic use cases, as well as discussions of potential future research challenges Comprehensive explorations of hybrid technologies, which focus on transversal aspects of human-machine systems Practical discussions of human-machine cooperation principles and methods for the design and evaluation of a brain-computer interface Perfect for academic and technical researchers with an interest in HMS, Handbook of Human-Machine Systems will also earn a place in the libraries of technical professionals practicing in areas including computer science, artificial intelligence, cognitive science, engineering, psychology, and neurobiology.
This book offers a comprehensive snapshot of practically-relevant developments in the field of smart information technologies. Including selected papers presented at the First International Conference on Smart Information and Communication Technologies, SmartICT 2019, held on September 26-28, in 2019, Saidia, Morocco, it reports on practical findings, and includes useful tutorials concerning current technologies and suggestions to improve them. It covers a wide range of applications, from health and energy management, to digital education, agriculture and cybersecurity, providing readers with a source of new ideas for future research and collaborations.
This book provides readers with a 360-degree perspective on the Internet of Things (IoT) design and M2M communication process. It is intended to be used as a design guide for the development of IoT solutions, covering architecture, design, and development methods. This book examines applications such as industry automation for Industry 4.0, Internet of Medical Things (IoMT), and Internet of Services (IoS) as it is unfolding. Discussions on engineering fundamentals are limited to what is required for the realization of IoT solutions. Internet of Things and M2M Communication Technologies: Architecture and Practical Design Approach to IoT in Industry 4.0 is written by an industry veteran with more than 30 years of hands-on experience. It is an invaluable guide for electrical, electronic, computer science, and information science engineers who aspire to be IoT designers and an authoritative reference for practicing designers working on IoT device development. Provides complete design approach to develop IoT solutions; Includes reference designs and guidance on relevant standards compliance; Addresses design for manufacturability and business models.
Chapter “A Multi-functional Design Approach to Deal with New Urban Challenges” is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.
This book discovers what it will take to reindustrialize the previous industrial powerhouses in order to offset the advantages of cheap labor suppliers dominating the industrial sector by exploring the current situation of the production, processing, and manufacturing industries. The Internet of Things (IoT), Big Data, Cyber-Physical Systems (CPS), and Cloud Computing, Cyber Security, Cobotics, Automation, AI, 3D Printing and Additive Manufacturing, SDN, Blockchain technologies are outlined in this unique and comprehensive book, which has true potential for professionals, researchers, policymakers, and book users. New Horizons for Industry 4.0 in Modern Business encompass trends in business and technology globally that may completely alter how manufacturing and production are conducted. What you will discover: Learn about the Industrial Internet of Things and the Industrial Internet. Learn about the technologies that must develop to support Industry 4.0 and what is being done right now to make that happen. In this book, the topic of Industry 4.0 is covered in detail, and it even moves on to concepts of Digital Twins to boost output and create Industrial Internet of Things. With the development of new digital industrial technology, or "Industry 4.0," it is now feasible to collect and analyze data from many machines, resulting in processes that are quicker, more adaptable, and more efficient, producing things of higher quality while spending less money. The manufacturing revolution will boost productivity, alter economics, promote industrial development, and alter workforce demographics, ultimately altering the competitiveness of businesses and areas. Although advanced digital technology is being employed in manufacturing, Industry 4.0 will completely change how things are done. Greater production efficiencies will result, and conventional connections between suppliers, manufacturers, and consumers-as well as between people and machines-will shift. Industry 4.0 is changing the business process. This disruptive technology is radically changing the way businesses/manufacturing is conducted. It will give machines that little bit of intuition with the help of robotics, 3D printing, artificial intelligence, augmented reality, and virtual reality-that will help them do mindless and repetitive jobs without human intervention, allowing humans to focus more on their core competencies.
Unique selling point: Comprehensive tome on developing and implementing parallel and distributed systems Core audience: Computer science title for systems developers and designers Place in the market: Professional title for a niche segment of developers and programmers
This book highlights leading-edge research in multi-disciplinary areas in Physics, Engineering, Medicine, and Health care, from the 6th IRC Conference on Science, Engineering and Technology (IRC-SET 2020) held in July 2020 at Singapore. The papers were shortlisted after extensive rounds of reviews by a panel of esteemed individuals who are pioneers in their domains. The book also contains excerpts of the speeches by eminent personalities who graced the occasion, thereby providing written documentation of the event.
This book engages with contemporary, and often polarizing, debates surrounding the risks of adolescent use of digital media and internet technologies. By drawing on multiple research studies, the text synthesizes current understandings of the impacts of social network use, online gaming, pornography, and phenomena, including cyberbullying, cyberstalking, and internet addiction, to develop recommendations for the effective identification of at-risk youth, as well as strategies for informed communication about online risks and opportunities. It shows how media discussion of risks to children and teenagers from new technology is highly emotive and often exaggerated, rooted in the “moral panic” surrounding new cultural practices that young people engage in, but which adults do not understand. Online risks are thus conceptualized as centering on three areas, specific to adolescence, which have undergone radical changes due to new internet technology. These include young people’s identity, the types of content that are accessed, and social relationships. The author shows how these matters stem from the potential of new technology to establish new interpersonal connections, emphasizing how it brings opportunities, as much as risks. As such, he provides a uniquely balanced discussion of potential dangers, while also emphasizing the opportunities for social, academic, and personal growth which new technologies afford young people. It will be indispensable for researchers and clinicians interested in assessing levels of online risk, as well as scholars and educators with interests in cyberpsychology, social psychology, cyber culture, social aspects of computing and media, and adolescent development.
Application of Artificial Intelligence in Early Detection of Lung Cancer presents the most up-to-date computer-aided diagnosis techniques used to effectively predict and diagnose lung cancer. The presence of pulmonary nodules on lung parenchyma is often considered an early sign of lung cancer, thus using machine and deep learning technologies to identify them is key to improve patients’ outcome and decrease the lethal rate of such disease. The book discusses topics such as basics of lung cancer imaging, pattern recognition techniques, deep learning, and nodule detection and localization. In addition, the book discusses risk prediction based on radiological analysis and 3D modeling. This is a valuable resource for cancer researchers, oncologists, graduate students, radiologists, and members of biomedical field who are interested in the potential of AI technologies in the diagnosis of lung cancer.
Stopping Losses from Accidental and Malicious Actions Around the world, users cost organizations billions of dollars due to simple errors and malicious actions. They believe that there is some deficiency in the users. In response, organizations believe that they have to improve their awareness efforts and making more secure users. This is like saying that coalmines should get healthier canaries. The reality is that it takes a multilayered approach that acknowledges that users will inevitably make mistakes or have malicious intent, and the failure is in not planning for that. It takes a holistic approach to assessing risk combined with technical defenses and countermeasures layered with a security culture and continuous improvement. Only with this kind of defense in depth can organizations hope to prevent the worst of the cybersecurity breaches and other user-initiated losses. Using lessons from tested and proven disciplines like military kill-chain analysis, counterterrorism analysis, industrial safety programs, and more, Ira Winkler and Dr. Tracy Celaya's You CAN Stop Stupid provides a methodology to analyze potential losses and determine appropriate countermeasures to implement. Minimize business losses associated with user failings Proactively plan to prevent and mitigate data breaches Optimize your security spending Cost justify your security and loss reduction efforts Improve your organization’s culture Business technology and security professionals will benefit from the information provided by these two well-known and influential cybersecurity speakers and experts.
Outsourcing permeates the IT world and has had a profound impact on the work of IS professionals. Nearly all will, at some stage in their careers, work with outsourced services as customer or supplier. Elizabeth Sparrow's insights into the benefits and pitfalls of this complex area will help IS professionals tackle the challenges of outsourcing. Combining relevant background information with practical guidance this book covers the whole outsourcing process, from the initial decision to outsource through to managing the outsourced services on a day-to-day basis. Successful IT Outsourcing considers: - The objectives behind outsourcing - The selection of a service provider - The management and measurement of the performance of outsourced services - The role of the outsourcing contract - Why outsourcing sometimes fails and how to turn failure into success Features and Benefits: - Describes the origins of IT outsourcing, and recent developments - Examines the way in which an organization might determine whether to outsource and how it can choose a service provider - Discusses how to develop effective outsourcing relationships- Provides context and advice to assist IS professionals, whose work is being outsourced, as they consider their future careers and the possibility of transferring to a new employer
|
You may like...
Digital Libraries - Integrating Content…
Mark V Dahl, Kyle Banerjee, …
Paperback
R1,150
Discovery Miles 11 500
Institutions guaranteeing access to…
Organisation for Economic Cooperation and Development
Paperback
R1,384
Discovery Miles 13 840
The Coming Wave - AI, Power and Our…
Mustafa Suleyman, Michael Bhaskar
Paperback
Principles of Business Information…
George Reynolds, Ralph M. Stair, …
Paperback
Going digital guide to data governance…
Organisation for Economic Cooperation and Development
Paperback
R613
Discovery Miles 6 130
OECD report on public communication…
Organisation for Economic Cooperation and Development
Paperback
R1,953
Discovery Miles 19 530
Principles Of Business Information…
Ralph Stair, George Reynolds, …
Paperback
(1)R1,199 Discovery Miles 11 990
|