|
Showing 1 - 10 of
10 matches in All Departments
Link prediction is required to understand the evolutionary theory
of computing for different social networks. However, the stochastic
growth of the social network leads to various challenges in
identifying hidden links, such as representation of graph,
distinction between spurious and missing links, selection of link
prediction techniques comprised of network features, and
identification of network types. Hidden Link Prediction in
Stochastic Social Networks concentrates on the foremost techniques
of hidden link predictions in stochastic social networks including
methods and approaches that involve similarity index techniques,
matrix factorization, reinforcement, models, and graph
representations and community detections. The book also includes
miscellaneous methods of different modalities in deep learning,
agent-driven AI techniques, and automata-driven systems and will
improve the understanding and development of automated machine
learning systems for supervised, unsupervised, and
recommendation-driven learning systems. It is intended for use by
data scientists, technology developers, professionals, students,
and researchers.
This book aims to provide a detailed understanding of
IoMT-supported applications while engaging premium smart computing
methods and improved algorithms in the field of computer science.
It contains thirteen chapters discussing various applications under
the umbrella of the Internet of Medical Things. These applications
geared towards IoMT cloud analysis, machine learning, computer
vision and deep learning have enabled the evaluation of the
proposed solutions.
The Internet has gone from an Internet of people to an Internet of
Things (IoT). This has brought forth strong levels of complexity in
handling interoperability that involves the integrating of wireless
sensor networks (WSNs) into IoT. This book offers insights into the
evolution, usage, challenges, and proposed countermeasures
associated with the integration. Focusing on the integration of
WSNs into IoT and shedding further light on the subtleties of such
integration, this book aims to highlight the encountered problems
and provide suitable solutions. It throws light on the various
types of threats that can attack both WSNs and IoT along with the
recent approaches to counter them. This book is designed to be the
first choice of reference at research and development centers,
academic institutions, university libraries, and any institution
interested in the integration of WSNs into IoT. Undergraduate and
postgraduate students, Ph.D. scholars, industry technologists,
young entrepreneurs, and researchers working in the field of
security and privacy in IoT are the primary audience of this book.
The book aims to showcase the basics of both IoT and Blockchain for
beginners as well as their integration and challenge discussions
for existing practitioner. It aims to develop understanding of the
role of blockchain in fostering security. The objective of this
book is to initiate conversations among technologists, engineers,
scientists, and clinicians to synergize their efforts in producing
low-cost, high-performance, highly efficient, deployable IoT
systems. It presents a stepwise discussion, exhaustive literature
survey, rigorous experimental analysis and discussions to
demonstrate the usage of blockchain technology for securing
communications. The book evaluates, investigate, analyze and
outline a set of security challenges that needs to be addressed in
the near future. The book is designed to be the first reference
choice at research and development centers, academic institutions,
university libraries and any institutions interested in exploring
blockchain. UG/PG students, PhD Scholars of this fields, industry
technologists, young entrepreneurs and researchers working in the
field of blockchain technology are the primary audience of this
book.
This book aims to provide a detailed understanding of
IoMT-supported applications while engaging premium smart computing
methods and improved algorithms in the field of computer science.
It contains thirteen chapters discussing various applications under
the umbrella of the Internet of Medical Things. These applications
geared towards IoMT cloud analysis, machine learning, computer
vision and deep learning have enabled the evaluation of the
proposed solutions.
This book presents a set of soft computing approaches and their
application in data analytics, classification model, and control.
The basics of fuzzy logic implementation for advanced hybrid fuzzy
driven optimization methods has been covered in the book. The
various soft computing techniques, including Fuzzy Logic, Rough
Sets, Neutrosophic Sets, Type-2 Fuzzy logic, Neural Networks,
Generative Adversarial Networks, and Evolutionary Computation have
been discussed and they are used on variety of applications
including data analytics, classification model, and control. The
book is divided into two thematic parts. The first thematic section
covers the various soft computing approaches for text
classification and data analysis, while the second section focuses
on the fuzzy driven optimization methods for the control systems.
The chapters has been written and edited by active researchers,
which cover hypotheses and practical considerations; provide
insights into the design of hybrid algorithms for applications in
data analytics, classification model, and engineering control.
This book uncovers the stakes and possibilities of handling
pandemic diseases with the help of Computational Intelligence,
using cases and applications from the current Covid-19 pandemic.
The book chapters will focus on the application of CI and its
related fields in managing different aspects of Covid-19, including
modelling of the disease spread, data-driven prediction,
identification of disease hotspots, and medical decision support.
This book will focus on the involvement of data mining and
intelligent computing methods for recent advances in Biomedical
applications and algorithms of nature-inspired computing for
Biomedical systems. The proposed meta heuristic or nature-inspired
techniques should be an enhanced, hybrid, adaptive or improved
version of basic algorithms in terms of performance and convergence
metrics. In this exciting and emerging interdisciplinary area a
wide range of theory and methodologies are being investigated and
developed to tackle complex and challenging problems. Today,
analysis and processing of data is one of big focuses among
researchers community and information society. Due to evolution and
knowledge discovery of natural computing, related meta heuristic or
bio-inspired algorithms have gained increasing popularity in the
recent decade because of their significant potential to tackle
computationally intractable optimization dilemma in medical,
engineering, military, space and industry fields. The main reason
behind the success rate of nature inspired algorithms is their
capability to solve problems. The nature inspired optimization
techniques provide adaptive computational tools for the complex
optimization problems and diversified engineering applications.
Tentative Table of Contents/Topic Coverage: - Neural Computation -
Evolutionary Computing Methods - Neuroscience driven AI Inspired
Algorithms - Biological System based algorithms - Hybrid and
Intelligent Computing Algorithms - Application of Natural Computing
- Review and State of art analysis of Optimization algorithms -
Molecular and Quantum computing applications - Swarm Intelligence -
Population based algorithm and other optimizations
Wearable Telemedicine Technology for the Healthcare Industry:
Product Design and Development focuses on recent advances and
benefits of wearable telemedicine techniques for remote health
monitoring and prevention of chronic conditions, providing real
time feedback and help with rehabilitation and biomedical
applications. Readers will learn about various techniques used by
software engineers, computer scientists and biomedical engineers to
apply intelligent systems, artificial intelligence, machine
learning, virtual reality and augmented reality to gather,
transmit, analyze and deliver real-time clinical and biological
data to clinicians, patients and researchers. Wearable telemedicine
technology is currently establishing its place with large-scale
impact in many healthcare sectors because information about patient
health conditions can be gathered anytime and anywhere outside of
traditional clinical settings, hence saving time, money and even
lives.
Link prediction is required to understand the evolutionary theory
of computing for different social networks. However, the stochastic
growth of the social network leads to various challenges in
identifying hidden links, such as representation of graph,
distinction between spurious and missing links, selection of link
prediction techniques comprised of network features, and
identification of network types. Hidden Link Prediction in
Stochastic Social Networks concentrates on the foremost techniques
of hidden link predictions in stochastic social networks including
methods and approaches that involve similarity index techniques,
matrix factorization, reinforcement, models, and graph
representations and community detections. The book also includes
miscellaneous methods of different modalities in deep learning,
agent-driven AI techniques, and automata-driven systems and will
improve the understanding and development of automated machine
learning systems for supervised, unsupervised, and
recommendation-driven learning systems. It is intended for use by
data scientists, technology developers, professionals, students,
and researchers.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R398
R369
Discovery Miles 3 690
Loot
Nadine Gordimer
Paperback
(2)
R398
R369
Discovery Miles 3 690
|