![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
Showing 1 - 25 of 157 matches in All Departments
This book focuses on the fundamentals of deep learning along with reporting on the current state-of-art research on deep learning. In addition, it provides an insight of deep neural networks in action with illustrative coding examples. Deep learning is a new area of machine learning research which has been introduced with the objective of moving ML closer to one of its original goals, i.e. artificial intelligence. Deep learning was developed as an ML approach to deal with complex input-output mappings. While traditional methods successfully solve problems where final value is a simple function of input data, deep learning techniques are able to capture composite relations between non-immediately related fields, for example between air pressure recordings and English words, millions of pixels and textual description, brand-related news and future stock prices and almost all real world problems. Deep learning is a class of nature inspired machine learning algorithms that uses a cascade of multiple layers of nonlinear processing units for feature extraction and transformation. Each successive layer uses the output from the previous layer as input. The learning may be supervised (e.g. classification) and/or unsupervised (e.g. pattern analysis) manners. These algorithms learn multiple levels of representations that correspond to different levels of abstraction by resorting to some form of gradient descent for training via backpropagation. Layers that have been used in deep learning include hidden layers of an artificial neural network and sets of propositional formulas. They may also include latent variables organized layer-wise in deep generative models such as the nodes in deep belief networks and deep boltzmann machines. Deep learning is part of state-of-the-art systems in various disciplines, particularly computer vision, automatic speech recognition (ASR) and human action recognition.
This book is divided into three parts. The first part discusses the Metaverse's basics, development, and optional applications such as 3D virtual dressing room-based user-friendly Metaverse, the use of Metaverse in the healthcare and environment sectors as well as the ethics of the Metaverse and digital virtual environments. Part two presents some chapters that discuss emerging technologies in the Metaverse world including IoT, digital twining, and artificial intelligence and shows its impact on climate change. The third part contains chapters discussing cybersecurity in the Metaverse including blockchain technology opportunities and applications and the threat of the digital humanities in the Metaverse. The book is suitable for students and academics aiming to build up their background on the Future of the Metaverse in the Virtual Era and Physical World.
This book discusses vehicular communication systems, IoT, intelligent transportation systems and the Internet of Vehicles, and also introduces destination marketing in a structured manner. It is primarily intended for research students interested in emerging technologies for connected Internet of Vehicles and intelligent transportation system networks; academics in higher education institutions, including universities and vocational colleges; IT professionals; policy makers; and legislators. The book can also be used as a reference resource for both undergraduate and graduate studies. Written in plain and simple language, it describes new concepts so that they are accessible to readers without prior knowledge of the field.
This volume comprises of 21 selected chapters, including two overview chapters devoted to abdominal imaging in clinical applications supported computer aided diagnosis approaches as well as different techniques for solving the pectoral muscle extraction problem in the preprocessing part of the CAD systems for detecting breast cancer in its early stage using digital mammograms. The aim of this book is to stimulate further research in medical imaging applications based algorithmic and computer based approaches and utilize them in real-world clinical applications. The book is divided into four parts, Part-I: Clinical Applications of Medical Imaging, Part-II: Classification and clustering, Part-III: Computer Aided Diagnosis (CAD) Tools and Case Studies and Part-IV: Bio-inspiring based Computer Aided diagnosis techniques.
The book focuses on machine learning. Divided into three parts, the first part discusses the feature selection problem. The second part then describes the application of machine learning in the classification problem, while the third part presents an overview of real-world applications of swarm-based optimization algorithms. The concept of machine learning (ML) is not new in the field of computing. However, due to the ever-changing nature of requirements in today's world it has emerged in the form of completely new avatars. Now everyone is talking about ML-based solution strategies for a given problem set. The book includes research articles and expository papers on the theory and algorithms of machine learning and bio-inspiring optimization, as well as papers on numerical experiments and real-world applications.
This book offers an essential guide to IoT Security, Smart Cities, IoT Applications, etc. In addition, it presents a structured introduction to the subject of destination marketing and an exhaustive review on the challenges of information security in smart and intelligent applications, especially for IoT and big data contexts. Highlighting the latest research on security in smart cities, it addresses essential models, applications, and challenges. Written in plain and straightforward language, the book offers a self-contained resource for readers with no prior background in the field. Primarily intended for students in Information Security and IoT applications (including smart cities systems and data heterogeneity), it will also greatly benefit academic researchers, IT professionals, policymakers and legislators. It is well suited as a reference book for both undergraduate and graduate courses on information security approaches, the Internet of Things, and real-world intelligent applications.
This book presents recent applications and approaches as well as challenges in digital forensic science. One of the evolving challenges that is covered in the book is the cloud forensic analysis which applies the digital forensic science over the cloud computing paradigm for conducting either live or static investigations within the cloud environment. The book also covers the theme of multimedia forensics and watermarking in the area of information security. That includes highlights on intelligence techniques designed for detecting significant changes in image and video sequences. Moreover, the theme proposes recent robust and computationally efficient digital watermarking techniques. The last part of the book provides several digital forensics related applications, including areas such as evidence acquisition enhancement, evidence evaluation, cryptography, and finally, live investigation through the importance of reconstructing the botnet attack scenario to show the malicious activities and files as evidences to be presented in a court.
This book brings together scientists, researchers, practitioners, and students from academia and industry to present recent and ongoing research activities concerning the latest advances, techniques, and applications of natural language processing systems, and to promote the exchange of new ideas and lessons learned. Taken together, the chapters of this book provide a collection of high-quality research works that address broad challenges in both theoretical and applied aspects of intelligent natural language processing. The book presents the state-of-the-art in research on natural language processing, computational linguistics, applied Arabic linguistics and related areas. New trends in natural language processing systems are rapidly emerging - and finding application in various domains including education, travel and tourism, and healthcare, among others. Many issues encountered during the development of these applications can be resolved by incorporating language technology solutions. The topics covered by the book include: Character and Speech Recognition; Morphological, Syntactic, and Semantic Processing; Information Extraction; Information Retrieval and Question Answering; Text Classification and Text Mining; Text Summarization; Sentiment Analysis; Machine Translation Building and Evaluating Linguistic Resources; and Intelligent Language Tutoring Systems.
The success of a BCI system depends as much on the system itself as on the user's ability to produce distinctive EEG activity. BCI systems can be divided into two groups according to the placement of the electrodes used to detect and measure neurons firing in the brain. These groups are: invasive systems, electrodes are inserted directly into the cortex are used for single cell or multi unit recording, and electrocorticography (EcoG), electrodes are placed on the surface of the cortex (or dura); noninvasive systems, they are placed on the scalp and use electroencephalography (EEG) or magnetoencephalography (MEG) to detect neuron activity. The book is basically divided into three parts. The first part of the book covers the basic concepts and overviews of Brain Computer Interface. The second part describes new theoretical developments of BCI systems. The third part covers views on real applications of BCI systems.
'Rough Computing' explores the application of rough set theory, which has attracted attention because of the ability to enhance databases by allowing for the management of uncertainty, a comparative analysis between rough sets, and other intelligent data analysis.
The main objective of pervasive computing systems is to create environments where computers become invisible by being seamlessly integrated and connected into our everyday environment, where such embedded computers can then provide inf- mation and exercise intelligent control when needed, but without being obtrusive. Pervasive computing and intelligent multimedia technologies are becoming incre- ingly important to the modern way of living. However, many of their potential applications have not yet been fully realized. Intelligent multimedia allows dynamic selection, composition and presentation of the most appropriate multimedia content based on user preferences. A variety of applications of pervasive computing and - telligent multimedia are being developed for all walks of personal and business life. Pervasive computing (often synonymously called ubiquitous computing, palpable computing or ambient intelligence) is an emerging ?eld of research that brings in revolutionary paradigms for computing models in the 21st century. Pervasive c- puting is the trend towards increasingly ubiquitous connected computing devices in the environment, a trend being brought about by a convergence of advanced el- tronic - and particularly, wireless - technologies and the Internet. Recent advances in pervasive computers, networks, telecommunications and information technology, along with the proliferation of multimedia mobile devices - such as laptops, iPods, personal digital assistants (PDAs) and cellular telephones - have further stimulated the development of intelligent pervasive multimedia applications. These key te- nologiesarecreatingamultimediarevolutionthatwillhavesigni?cantimpactacross a wide spectrum of consumer, business, healthcare and governmental domains.
Foundations of Computational Intelligence Volume 4: Bio-Inspired Data Mining Theoretical Foundations and Applications Recent advances in the computing and electronics technology, particularly in sensor devices, databases and distributed systems, are leading to an exponential growth in the amount of data stored in databases. It has been estimated that this amount doubles every 20 years. For some applications, this increase is even steeper. Databases storing DNA sequence, for example, are doubling their size every 10 months. This growth is occurring in several applications areas besides bioinformatics, like financial transactions, government data, environmental mo- toring, satellite and medical images, security data and web. As large organizations recognize the high value of data stored in their databases and the importance of their data collection to support decision-making, there is a clear demand for - phisticated Data Mining tools. Data mining tools play a key role in the extraction of useful knowledge from databases. They can be used either to confirm a parti- lar hypothesis or to automatically find patterns. In the second case, which is - lated to this book, the goal may be either to describe the main patterns present in dataset, what is known as descriptive Data Mining or to find patterns able to p- dict behaviour of specific attributes or features, known as predictive Data Mining. While the first goal is associated with tasks like clustering, summarization and association, the second is found in classification and regression problems.
This book provides a concise overview of the current state of the art in cybersecurity and shares novel and exciting ideas and techniques, along with specific cases demonstrating their practical application. It gathers contributions by both academic and industrial researchers, covering all aspects of cybersecurity and addressing issues in secure information systems as well as other emerging areas. The content comprises high-quality research articles and reviews that promote a multidisciplinary approach and reflect the latest advances, challenges, requirements and methodologies. Thus, the book investigates e.g. security vulnerabilities, cybercrime, and privacy issues related to big data analysis, as well as advances in digital forensics, secure smart city services, and risk mitigation strategies for devices employing cyber-physical systems. Given its scope, the book offers a valuable resource for students, researchers, IT professionals and providers, citizens, consumers and policymakers involved or interested in the modern security procedures needed to protect our information and communication resources. Its goal is to foster a community committed to further research and education, and one that can also translate its findings into concrete practices.
Global optimization is a branch of applied mathematics and numerical analysis that deals with the task of finding the absolutely best set of admissible conditions to satisfy certain criteria / objective function(s), formulated in mathematical terms. Global optimization includes nonlinear, stochastic and combinatorial programming, multiobjective programming, control, games, geometry, approximation, algorithms for parallel architectures and so on. Due to its wide usage and applications, it has gained the attention of researchers and practitioners from a plethora of scientific domains. Typical practical examples of global optimization applications include: Traveling salesman problem and electrical circuit design (minimize the path length); safety engineering (building and mechanical structures); mathematical problems (Kepler conjecture); Protein structure prediction (minimize the energy function) etc. Global Optimization algorithms may be categorized into several types: Deterministic (example: branch and bound methods), Stochastic optimization (example: simulated annealing). Heuristics and meta-heuristics (example: evolutionary algorithms) etc. Recently there has been a growing interest in combining global and local search strategies to solve more complicated optimization problems. This edited volume comprises 17 chapters, including several overview Chapters, which provides an up-to-date and state-of-the art research covering the theory and algorithms of global optimization. Besides research articles and expository papers on theory and algorithms of global optimization, papers on numerical experiments and on real world applications were also encouraged. The book is divided into 2 main parts.
Richard Chbeir, Youakim Badr, Ajith Abraham, and Aboul-Ella Hassanien Abstract As the Web continues to grow and evolve, more and more data are becoming available. Particularly, multimedia and XML-based data are produced regularly and in increasing way in our daily digital activities, and their retrieval and access must be explored and studied in this emergent web-based era. This book provides reviews of the cutting-edge technologies and insights of various topics related to XML-based and multimedia information access and retrieval under the umbrella of Web Intelligence and reporting how organizations can gain compe- tive advantages by applying new different emergent techniques in the real-world scenarios. The primary target audience for the book includes researchers, scholars, postgraduate students and developers who are interested in advanced information retrieval on the web research and related issues. 1 Introduction Since the last two decades, Internet has changed our daily life by rede?ning the meanings and processes of business, commerce, marketing, ?nance, publishing, R. Chbeir Universite ' de Bourgogne, LE2I-UMR CNRS 5158, Fac. de Sciences Mirande, 21078 Dijon Cedex, France e-mail: richard. chbeir@u-bourgogne. fr Y. Badr INSA de Lyon, Universite ' de Lyon, Depart ' ement Informatique, 7 avenue Jean Capelle, 69621 Villeurbanne CX, France e-mail: youakim. badr@insa-lyon. fr A. Abraham Norwegian University of Science & Technology, Center for Quanti?able Quality of Service in Communication Systems, O. S. Bragstads plass 2E, 7491 Trondheim, Norway e-mail: ajith. abraham@ieee. org A. -E. Hassanien Kuwait University, College of Business & Administration, Dept.
This book highlights practical quantum key distribution systems and research on the implementations of next-generation quantum communication, as well as photonic quantum device technologies. It discusses how the advances in quantum computing and quantum physics have allowed the building, launching and deploying of space exploration systems that are capable of more and more as they become smaller and lighter. It also presents theoretical and experimental research on the potential and limitations of secure communication and computation with quantum devices, and explores how security can be preserved in the presence of a quantum computer, and how to achieve long-distance quantum communication. The development of a real quantum computer is still in the early stages, but a number of research groups have investigated the theoretical possibilities of such computers.
Artificial Intelligence and Industry 4.0 explores recent advancements in blockchain technology and artificial intelligence (AI) as well as their crucial impacts on realizing Industry 4.0 goals. The book explores AI applications in industry including Internet of Things (IoT) and Industrial Internet of Things (IIoT) technology. Chapters explore how AI (machine learning, smart cities, healthcare, Society 5.0, etc.) have numerous potential applications in the Industry 4.0 era. This book is a useful resource for researchers and graduate students in computer science researching and developing AI and the IIoT.
Foundations of Computational Intelligence Volume 5: Function Approximation and Classification Approximation theory is that area of analysis which is concerned with the ability to approximate functions by simpler and more easily calculated functions. It is an area which, like many other fields of analysis, has its primary roots in the mat- matics. The need for function approximation and classification arises in many branches of applied mathematics, computer science and data mining in particular. This edited volume comprises of 14 chapters, including several overview Ch- ters, which provides an up-to-date and state-of-the art research covering the theory and algorithms of function approximation and classification. Besides research ar- cles and expository papers on theory and algorithms of function approximation and classification, papers on numerical experiments and real world applications were also encouraged. The Volume is divided into 2 parts: Part-I: Function Approximation and Classification - Theoretical Foundations Part-II: Function Approximation and Classification - Success Stories and Real World Applications Part I on Function Approximation and Classification - Theoretical Foundations contains six chapters that describe several approaches Feature Selection, the use Decomposition of Correlation Integral, Some Issues on Extensions of Information and Dynamic Information System and a Probabilistic Approach to the Evaluation and Combination of Preferences Chapter 1 "Feature Selection for Partial Least Square Based Dimension Red- tion" by Li and Zeng investigate a systematic feature reduction framework by combing dimension reduction with feature selection. To evaluate the proposed framework authors used four typical data sets.
Social networks provide a powerful abstraction of the structure and dynamics of diverse kinds of people or people-to-technology interaction. Web 2.0 has enabled a new generation of web-based communities, social networks, and folksonomies to facilitate collaboration among different communities. This unique text/reference compares and contrasts the ethological approach to social behavior in animals with web-based evidence of social interaction, perceptual learning, information granulation, the behavior of humans and affinities between web-based social networks. An international team of leading experts present the latest advances of various topics in intelligent-social-networks and illustrates how organizations can gain competitive advantages by applying the different emergent techniques in real-world scenarios. The work incorporates experience reports, survey articles, and intelligence techniques and theories with specific network technology problems. Topics and Features: Provides an overview social network tools, and explores methods for discovering key players in social networks, designing self-organizing search systems, and clustering blog sites, surveys techniques for exploratory analysis and text mining of social networks, approaches to tracking online community interaction, and examines how the topological features of a system affects the flow of information, reviews the models of network evolution, covering scientific co-citation networks, nature-inspired frameworks, latent social networks in e-Learning systems, and compound communities, examines the relationship between the intent of web pages, their architecture and the communities who take part in their usage and creation, discusses team selection based on members' social context, presents social network applications, including music recommendation and face recognition in photographs, explores the use of social networks in web services that focus on the discovery stage in the life cycle of these web services. This useful and comprehensive volume will be indispensible to senior undergraduate and postgraduate students taking courses in Social Intelligence, as well as to researchers, developers, and postgraduates interested in intelligent-social-networks research and related areas.
This book explores the main concepts, algorithms, and techniques of Machine Learning and data mining for aerospace technology. Satellites are the 'eagle eyes' that allow us to view massive areas of the Earth simultaneously, and can gather more data, more quickly, than tools on the ground. Consequently, the development of intelligent health monitoring systems for artificial satellites - which can determine satellites' current status and predict their failure based on telemetry data - is one of the most important current issues in aerospace engineering. This book is divided into three parts, the first of which discusses central problems in the health monitoring of artificial satellites, including tensor-based anomaly detection for satellite telemetry data and machine learning in satellite monitoring, as well as the design, implementation, and validation of satellite simulators. The second part addresses telemetry data analytics and mining problems, while the last part focuses on security issues in telemetry data.
In recent decades Multimedia processing has emerged as an important technology to generate content based on images, video, audio, graphics, and text. This book is a compilation of the latest trends and developments in the field of computational intelligence in multimedia processing. The edited book presents a large number of interesting applications to intelligent multimedia processing of various Computational Intelligence techniques including neural networks and fuzzy logic.
This volume presents recent research in cyber security and reports how organizations can gain competitive advantages by applying the different security techniques in real-world scenarios. The volume provides reviews of cutting edge technologies, algorithms, applications and insights for bio-inspiring cyber security-based systems. The book will be a valuable companion and comprehensive reference for both postgraduate and senior undergraduate students who are taking a course in cyber security. The volume is organized in self-contained chapters to provide greatest reading flexibility."
This volume provides updated, in-depth material on the application of intelligent optimization in biology and medicine. The aim of the book is to present solutions to the challenges and problems facing biology and medicine applications. This Volume comprises of 13 chapters, including an overview chapter, providing an up-to-date and state-of-the research on the application of intelligent optimization for bioinformatics applications, DNA based Steganography, a modified Particle Swarm Optimization Algorithm for Solving Capacitated Maximal Covering Location Problem in Healthcare Systems, Optimization Methods for Medical Image Super Resolution Reconstruction and breast cancer classification. Moreover, some chapters that describe several bio-inspired approaches in MEDLINE Text Mining, DNA-Binding Proteins and Classes, Optimized Tumor Breast Cancer Classification using Combining Random Subspace and Static Classifiers Selection Paradigms, and Dental Image Registration. The book will be a useful compendium for a broad range of readers-from students of undergraduate to postgraduate levels and also for researchers, professionals, etc.-who wish to enrich their knowledge on Intelligent Optimization in Biology and Medicine and applications with one single book.
This book provides a collection of high-quality research works that address broad challenges in both theoretical and applied aspects of dynamic wireless sensor networks (WSNs) for intelligent and smart applications in a variety of environments. It presents the most central concepts associated with Dynamic Wireless Sensor Networks applications, and discusses issues surrounding Wireless Sensor Network Structures for complex and mobile-based applications. The book subsequently discusses several topics related to energy management in dynamic WSNs, and reviews the steps involved in building a secure and trusted data transmission model using the WSN applications of intelligent environments. Lastly, it discusses the applications of WSNs in live data systems such as SCADA systems. Readers will discover a collection of high-quality research works that address broad challenges in both theoretical and applied aspects of WSNs for intelligent real-life applications. In addition, the book presents original research on the application of a dynamic WSN to solve the problem of energy consumption in a secure WSN during the process of data aggregation and transmission. Written by respected experts in the field, the book will stimulate further efforts in the application of the intelligent WSNs model, helping to solve the problem of data processing in a limited resource WSN-based environment. |
You may like...
Indentured - Behind The Scenes At Gupta…
Rajesh Sundaram
Paperback
(2)
|