![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > General
The free/open source approach has grown from a minor activity to
become a significant producer of robust, task-orientated software
for a wide variety of situations and applications. To life science
informatics groups, these systems present an appealing proposition
- high quality software at a very attractive price. Open source
software in life science research considers how industry and
applied research groups have embraced these resources, discussing
practical implementations that address real-world business
problems.
Machine learning algorithms allow computers to learn without being explicitly programmed. Their application is now spreading to highly sophisticated tasks across multiple domains, such as medical diagnostics or fully autonomous vehicles. While this development holds great potential, it also raises new safety concerns, as machine learning has many specificities that make its behaviour prediction and assessment very different from that for explicitly programmed software systems. This book addresses the main safety concerns with regard to machine learning, including its susceptibility to environmental noise and adversarial attacks. Such vulnerabilities have become a major roadblock to the deployment of machine learning in safety-critical applications. The book presents up-to-date techniques for adversarial attacks, which are used to assess the vulnerabilities of machine learning models; formal verification, which is used to determine if a trained machine learning model is free of vulnerabilities; and adversarial training, which is used to enhance the training process and reduce vulnerabilities. The book aims to improve readers’ awareness of the potential safety issues regarding machine learning models. In addition, it includes up-to-date techniques for dealing with these issues, equipping readers with not only technical knowledge but also hands-on practical skills.
Robotic Process Automation will continue its exponential growth over the next five years. With more than 54 vendors, different kinds of tools, generic applicability and as a cognitive and AI platform, RPA has fast become an opportunity that is too good to miss. So, how do you leverage the massive potential business value? Based on four years of research into over 420 business deployments, this book identifies the distinctive leading practices of front-runners, and a Total Value of Ownership (TVO) framework to drive out value across the RPA life-cycle. This book brings a new focus on RPA's strategic potential: the innovations made possible and how to deliver through effective sourcing stakeholder-buy-in, governance, change management, and capability development practices. RPA as a platform, linking with cognitive and AI technologies as part of digital transformation is highlighted. The central messages - think and behave strategically, start right, institutionalize fast, and innovate continuously - are demonstrated, with multiple client experiences, trials and lessons. From dealing with old world process and IT challenges, RPA is now being applied towards building the new digital world and becoming strategic in its application. * Based on extensive new research by world renowned authors * Comprehensive market overview * A systematic set of action principles across the RPA life-cycle * Challenges, and where value is being left on the table * A focus on metrics and Total Value of Ownership * Multiple client case studies * RPA as a foundation for cognitive and AI
Information networking has emerged as a multidisciplinary diversified area of research over the past few decades. From traditional wired telephony to cellular voice telephony and from wired access to wireless access to the Internet, information networks have profoundly impacted our lifestyles as they have undergone enormous growth. To understand this technology, students need to learn several disciplines and develop an intuitive feeling of how they interact with one another. To achieve this goal, the book describes important networking standards, classifying their underlying technologies in a logical manner and gives detailed examples of successful applications. The emergence of wireless access and dominance of the Ethernet in LAN technologies has shifted the innovations in networking towards the physical layer and characteristics of the medium. This book pays attention to the physical layer while we provide fundamentals of information networking technologies which are used in wired and wireless networks designed for local and wide area operations. The book provides a comprehensive treatment of the wired IEEE802.3 Ethernet, and Internet as well as ITU cellular 2G-6G wireless networks, IEEE 802.11 for Wi-Fi, and IEEE 802.15 for Bluetooth, ZigBee and ultra-wideband (UWB) technologies. The novelty of the book is that it places emphasis on physical communications issues related to formation and transmission of packets and characteristics of the medium for transmission in variety of networks. Material presented in the book will be beneficial for students of Electrical and Computer Engineering, Computer Science, Robotics Engineering, Biomedical Engineering, or other disciplines who are interested in integration of navigation into their multi-disciplinary projects. The book provides examples with supporting MATLAB codes and hands-on projects throughout to improve the ability of the readers to understand and implement variety of algorithms.
Learn the ins and outs of the IT security field and efficiently prepare for the CompTIA Security+ Exam SY0-601 with one easy-to-follow resource CompTIA Security+ Review Guide: Exam SY0-601, Fifth Edition helps you to efficiently review for the leading IT security certification—CompTIA Security+ SY0-601. Accomplished author and security expert James Michael Stewart covers each domain in a straightforward and practical way, ensuring that you grasp and understand the objectives as quickly as possible. Whether you’re refreshing your knowledge or doing a last-minute review right before taking the exam, this guide includes access to a companion online test bank that offers hundreds of practice questions, flashcards, and glossary terms. Covering all five domains tested by Exam SY0-601, this guide reviews: Attacks, Threats, and Vulnerabilities Architecture and Design Implementation Operations and Incident Response Governance, Risk, and Compliance This newly updated Fifth Edition of CompTIA Security+ Review Guide: Exam SY0-601 is not just perfect for anyone hoping to take the SY0-601 Exam, but it is also an excellent resource for those wondering about entering the IT security field.
Healthcare transformation requires us to continually look at new and better ways to manage insights - both within and outside the organization. Increasingly, the ability to glean and operationalize new insights efficiently as a byproduct of an organization's day-to-day operations is becoming vital for hospitals and health systems to survive and prosper. One of the long-standing challenges in healthcare informatics has been the ability to deal with the sheer variety and volume of disparate healthcare data and the increasing need to derive veracity and value out of it. This book addresses several topics important to the understanding and use of data in healthcare. First, it provides a formal explanation based on epistemology (theory of knowledge) of what data actually is, what we can know about it, and how we can reason with it. The culture of data is also covered and where it fits into healthcare. Then, data quality is addressed, with a historical appreciation, as well as new concepts and insights derived from the author's 35 years of experience in technology. The author provides a description of what healthcare data analysis is and how it is changing in the era of abundant data. Just as important is the topic of infrastructure and how it provides capability for data use. The book also describes how healthcare information infrastructure needs to change in order to meet current and future needs. The topics of artificial intelligence (AI) and machine learning in healthcare are also addressed. The author concludes with thoughts on the evolution of the role and use of data and information going into the future.
Looking towards the future can be daunting, but with Future Hackers, the sequel to The Future Is Now, you can prepare for the exciting changes that lie ahead. From technological advancements to cultural shifts, the coming years will bring unprecedented transformations that will shape our lives in ways we can't even imagine. This book is your essential guide to understanding these changes and adapting to them with optimism and confidence. With expert insights into the latest trends in work, leadership and technology, Future Hackers is your indispensable tool for thriving in a rapidly changing world. Whether you're a business leader, a student, or just someone who wants to stay ahead of the curve, this book will help you navigate the road to 2030 and beyond.
The need for continual development and transformation of healthcare information systems is evident, though progress in this arena is often met with a significant number of challenges. Developments in Healthcare Information Systems and Technologies: Models and Methods presents the latest research in healthcare information systems design, development, and deployment, benefiting researchers, practitioners, and students. Contributions investigate topics such as clinical education, electronic medical records, clinical decision support systems, and IT adoption in healthcare.
Prepare for the number one job in today’s tech sector -- app development –- as you learn the essentials of Microsoft® Visual Basic. The step-by-step, visual approach and professional programming opportunities in MICROSOFT® VISUAL BASIC® 2017 FOR WINDOWS® APPLICATIONS: INTRODUCTORY lay the initial groundwork for a successful degree in IT programming. You gain a fundamental understanding of Windows® programming for 2017. This edition’s innovative approach blends visual demonstrations of professional-quality programs with in-depth discussions of today’s most effective programming concepts and techniques. You practice what you’ve learned with numerous real programming assignments in each chapter that equip you to program independently at your best.
Discover one-of-a-kind AI strategies never before seen outside of academic papers! Learn how the principles of evolutionary computation overcome deep learning’s common pitfalls and deliver adaptable model upgrades without constant manual adjustment. In Evolutionary Deep Learning you will learn how to: Solve complex design and analysis problems with evolutionary computation Tune deep learning hyperparameters with evolutionary computation (EC), genetic algorithms, and particle swarm optimization Use unsupervised learning with a deep learning autoencoder to regenerate sample data Understand the basics of reinforcement learning and the Q Learning equation Apply Q Learning to deep learning to produce deep reinforcement learning Optimize the loss function and network architecture of unsupervised autoencoders Make an evolutionary agent that can play an OpenAI Gym game Evolutionary Deep Learning is a guide to improving your deep learning models with AutoML enhancements based on the principles of biological evolution. This exciting new approach utilizes lesser-known AI approaches to boost performance without hours of data annotation or model hyperparameter tuning. about the technology Evolutionary deep learning merges the biology-simulating practices of evolutionary computation (EC) with the neural networks of deep learning. This unique approach can automate entire DL systems and help uncover new strategies and architectures. It gives new and aspiring AI engineers a set of optimization tools that can reliably improve output without demanding an endless churn of new data. about the reader For data scientists who know Python.
The Chaos Machine is an essential book for our times - Ezra Klein The Chaos Machine is the story of how the world was driven mad by social media. The election of populists like Trump and Bolsonaro; strife and genocide in countries like Myanmar; the rampant spread of COVID-19 conspiracy theories as deadly as the pandemic itself; all of these are products of a breakdown in our social and political lives, a breakdown driven by the apps, companies and algorithms that compete constantly for our attention. Max Fisher is a leading New York Times technology reporter whose work has covered the way that social media sites - driven increasingly by artificial intelligence rather than human ingenuity - push users towards more and more extreme positions, deepening the divisions in society in pursuit of greater engagement and profit. With extraordinary access to the most powerful players in Silicon Valley, and with testimonies from around the world of the havoc being wreaked by our online selves, The Chaos Machine shows us how we got to this uniquely perilous moment - and how we might get out of it.
How will artificial intelligence change our world within twenty years?
Estimating software development often produces more angst than value, but it doesn't have to. Identify the needs behind estimate requests and determine how to meet those needs simply and easily. Choose estimation techniques based on current needs and available information, gaining benefit while reducing cost and effort. Detect bad assumptions that might sink your project if you don't adjust your plans. Discover what to do when an estimate is wrong, how to recover, and how to use that knowledge for future planning. Learn to communicate about estimates in a healthy and productive way, maximizing advantage to the organization and minimizing damage to the people. In a world where most developers hate estimation and most managers fear disappointment with the results, there is hope for both. It requires giving up some widely held misconceptions. Let go of the notion that "an estimate is an estimate" and estimate for the particular need you, and your organization, have. Realize that estimates have a limited shelf-life, and reestimate frequently if it's important. When reality differs from your estimate, don't lament; mine that disappointment for the gold that can be the longer-term jackpot. Estimate in comparison to past experience, by modeling the work mathematically, or a hybrid of both. Learn strategies for effective decomposition of work and aspects of the work that likely affect your estimates. Hedge your bets by comparing the results of different approaches. Find out what to do when an estimate proves wrong. And they will. They're estimates, after all. You'll discover that you can use estimates to warn you of danger so you can take appropriate action in time. Learn some crucial techniques to understand and communicate with those who need to understand. Address both the technical and sociological aspects of estimation, and you'll help your organization achieve its desired goals with less drama and more benefit. What You Need: No software needed, just your past experience and concern for the outcomes.
This book offers a survey of successful attributes of the systems engineer. It focuses on the key positive attributes of what today’s systems engineer should be and puts a model in place for achievement and behavior for future systems engineers. The book, in survey form, provides a description of how and why systems engineers can be, and have been, successful. It offers successful attributes, focuses on the key positive qualities, and drills down to the success features to aim for and the failure characteristics to avoid. The ending result is that it sets a model for achievement and behavior for future systems engineers to follow a successful path. This book will be helpful to systems engineers, industrial engineers, mechanical engineers, general engineers, and those in technical management.
This book is an attempt to establish in the readers the importance of creating interoperable data stores and writing rules for handling this data. It also covers extracts from a few project dissertations and a research funded project that the author had supervised.• Describes the power of ontologies for better data management• Provides an overview of knowledge engineering including ontology engineering, tools and techniques• Provides sample development procedures for creating two domain ontologies.• Depicts the utility of ontological representation in situation awareness• Demonstrates recommendation engine for unconventional emergencies using a hybrid reasoning approach.• The text explains how to make better utilization of resources when emergency strikesGraduates and undergraduates doing courses in artificial intelligence, semantic web and knowledge engineering will find this book beneficial.
Ditch the devices and bring back the magic of being a kid Screens are everywhere. Children spend an average of 7.5 hours on digital devices every day with profoundly negative consequences. While some tech may “amplify” real life experience (online music lessons or Zoom calls with faraway family, for example), the vast majority “amputates” by limiting physical activity, creating anxiety, or damaging self-esteem. Childhood Unplugged takes a bold approach to creating healthy boundaries around the use of digital media, suggesting kids should be offline for the majority of their time. Drawing on her own family’s experience, plus interviews with digital minimalists, educators, and child development experts, author Katherine Martinko presents: Meticulously researched analysis of the impacts of excessive screen time on children's physical, neurological, emotional, and social development Specific pathways to reduced screen exposure, naturally leading to more time spent outdoors, increased confidence and empathy, more creative and active play, and other benefits Inspiration for caregivers overwhelmed by the thought of severing ties with the digital babysitter Age-appropriate advice for fundamental change, with specific sections for babies and toddlers, school-aged children, and adolescents. Taking a calming, nonjudgmental approach, Childhood Unplugged is a lifeline for parents, caregivers, educators, and anyone who questions the role of digital media and yearns for the young people in their life to experience the profound beauty and magic of childhood.
Der mit der Digitalisierung der Kommunikation einhergehende Wandel von Kommunikations- und Medienkulturen beeinflusst die Produktionsbedingungen und den Rezeptionsrahmen von Texten sowie kommunikative Praktiken und kommunikatives Handeln. Um kommunikative Praktiken zu vollziehen und kommunikatives Handeln möglichst effektiv zu gestalten, entstehen vielfältige diskursive Kommunikationsräume, in denen mediale Akteure zu verschiedenen Zwecken miteinander agieren. Mit der Verlagerung der kommunikativen Praktiken in die digitale Welt kommt es zur Verlinkung von Texten zu Diskursen, die multisemiotisch und multimedial geprägt und auf Interaktion ausgerichtet sind. Dieses Buch ist solchen diversen textuellen und diskursiven Erscheinungsformen der massenmedialen Kommunikation gewidmet, die auf der Grundlage erschlossener Textkorpora interdisziplinär untersucht werden. Gegenstand der breit gefächerten Diskussion sind hier einzelne Texte und zusammenhängende Textformate in verschiedenen Medien sowie diskursiv organisierte Textwelten diverser multimodaler und -medialer Ausgestaltung.
Security and smart spaces are among the most significant topics in IoT nowadays. The implementation of secured smart spaces is at the heart of this concept, and its development is a key issue in the next generation IoT. This book addresses major security aspects and challenges in realizing smart spaces and sensing platforms in critical Cloud and IoT applications. The book focuses on both the design and implementation aspects of security models and strategies in smart that are enabled by wireless sensor networks and RFID systems. It mainly examines seamless data access approaches and encryption and decryption aspects in reliable IoT systems.
The book is about a very active research field in software engineering. In modern society, the fact of the world's high reliance on software requires the system's robustness, i.e., continual availability and satisfactory service quality. This requirement gives rise to the popularity of the research on the self-adaptive software in open environment. There are some academic conferences dedicated to this field. But there is a lack of monographs about the topic. We believe such need is unmet in marketplace. By publishing the book, it can help bridge the gap and bring benefits to readers thereof. Key Features: The topic is well-motivated, interesting and actively studied worldwide The research represents as the state-of-the-art in the field The technical part of the book is rigidly evaluated The theoretical part of the book is sound and proved The organization and presentation of the book will be double-checked by professional scholars |
You may like...
Genesis - Artificial Intelligence, Hope…
Eric Schmidt, Henry A. Kissinger, …
Paperback
If Anyone Builds It, Everyone Dies - The…
Eliezer Yudkowsky, Nate Soares
Paperback
CompTIA A+ Guide to Information…
Nicholas Pierce, Jean Andrews, …
Hardcover
Going digital guide to data governance…
Organisation for Economic Cooperation and Development
Paperback
R613
Discovery Miles 6 130
OECD report on public communication…
Organisation for Economic Cooperation and Development
Paperback
R1,953
Discovery Miles 19 530
|