Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 10 of 10 matches in All Departments
Link prediction is required to understand the evolutionary theory of computing for different social networks. However, the stochastic growth of the social network leads to various challenges in identifying hidden links, such as representation of graph, distinction between spurious and missing links, selection of link prediction techniques comprised of network features, and identification of network types. Hidden Link Prediction in Stochastic Social Networks concentrates on the foremost techniques of hidden link predictions in stochastic social networks including methods and approaches that involve similarity index techniques, matrix factorization, reinforcement, models, and graph representations and community detections. The book also includes miscellaneous methods of different modalities in deep learning, agent-driven AI techniques, and automata-driven systems and will improve the understanding and development of automated machine learning systems for supervised, unsupervised, and recommendation-driven learning systems. It is intended for use by data scientists, technology developers, professionals, students, and researchers.
This book aims to provide a detailed understanding of IoMT-supported applications while engaging premium smart computing methods and improved algorithms in the field of computer science. It contains thirteen chapters discussing various applications under the umbrella of the Internet of Medical Things. These applications geared towards IoMT cloud analysis, machine learning, computer vision and deep learning have enabled the evaluation of the proposed solutions.
The Internet has gone from an Internet of people to an Internet of Things (IoT). This has brought forth strong levels of complexity in handling interoperability that involves the integrating of wireless sensor networks (WSNs) into IoT. This book offers insights into the evolution, usage, challenges, and proposed countermeasures associated with the integration. Focusing on the integration of WSNs into IoT and shedding further light on the subtleties of such integration, this book aims to highlight the encountered problems and provide suitable solutions. It throws light on the various types of threats that can attack both WSNs and IoT along with the recent approaches to counter them. This book is designed to be the first choice of reference at research and development centers, academic institutions, university libraries, and any institution interested in the integration of WSNs into IoT. Undergraduate and postgraduate students, Ph.D. scholars, industry technologists, young entrepreneurs, and researchers working in the field of security and privacy in IoT are the primary audience of this book.
The book aims to showcase the basics of both IoT and Blockchain for beginners as well as their integration and challenge discussions for existing practitioner. It aims to develop understanding of the role of blockchain in fostering security. The objective of this book is to initiate conversations among technologists, engineers, scientists, and clinicians to synergize their efforts in producing low-cost, high-performance, highly efficient, deployable IoT systems. It presents a stepwise discussion, exhaustive literature survey, rigorous experimental analysis and discussions to demonstrate the usage of blockchain technology for securing communications. The book evaluates, investigate, analyze and outline a set of security challenges that needs to be addressed in the near future. The book is designed to be the first reference choice at research and development centers, academic institutions, university libraries and any institutions interested in exploring blockchain. UG/PG students, PhD Scholars of this fields, industry technologists, young entrepreneurs and researchers working in the field of blockchain technology are the primary audience of this book.
This book aims to provide a detailed understanding of IoMT-supported applications while engaging premium smart computing methods and improved algorithms in the field of computer science. It contains thirteen chapters discussing various applications under the umbrella of the Internet of Medical Things. These applications geared towards IoMT cloud analysis, machine learning, computer vision and deep learning have enabled the evaluation of the proposed solutions.
Wearable Telemedicine Technology for the Healthcare Industry: Product Design and Development focuses on recent advances and benefits of wearable telemedicine techniques for remote health monitoring and prevention of chronic conditions, providing real time feedback and help with rehabilitation and biomedical applications. Readers will learn about various techniques used by software engineers, computer scientists and biomedical engineers to apply intelligent systems, artificial intelligence, machine learning, virtual reality and augmented reality to gather, transmit, analyze and deliver real-time clinical and biological data to clinicians, patients and researchers. Wearable telemedicine technology is currently establishing its place with large-scale impact in many healthcare sectors because information about patient health conditions can be gathered anytime and anywhere outside of traditional clinical settings, hence saving time, money and even lives.
This book presents a set of soft computing approaches and their application in data analytics, classification model, and control. The basics of fuzzy logic implementation for advanced hybrid fuzzy driven optimization methods has been covered in the book. The various soft computing techniques, including Fuzzy Logic, Rough Sets, Neutrosophic Sets, Type-2 Fuzzy logic, Neural Networks, Generative Adversarial Networks, and Evolutionary Computation have been discussed and they are used on variety of applications including data analytics, classification model, and control. The book is divided into two thematic parts. The first thematic section covers the various soft computing approaches for text classification and data analysis, while the second section focuses on the fuzzy driven optimization methods for the control systems. The chapters has been written and edited by active researchers, which cover hypotheses and practical considerations; provide insights into the design of hybrid algorithms for applications in data analytics, classification model, and engineering control.
This book uncovers the stakes and possibilities of handling pandemic diseases with the help of Computational Intelligence, using cases and applications from the current Covid-19 pandemic. The book chapters will focus on the application of CI and its related fields in managing different aspects of Covid-19, including modelling of the disease spread, data-driven prediction, identification of disease hotspots, and medical decision support.
This book will focus on the involvement of data mining and intelligent computing methods for recent advances in Biomedical applications and algorithms of nature-inspired computing for Biomedical systems. The proposed meta heuristic or nature-inspired techniques should be an enhanced, hybrid, adaptive or improved version of basic algorithms in terms of performance and convergence metrics. In this exciting and emerging interdisciplinary area a wide range of theory and methodologies are being investigated and developed to tackle complex and challenging problems. Today, analysis and processing of data is one of big focuses among researchers community and information society. Due to evolution and knowledge discovery of natural computing, related meta heuristic or bio-inspired algorithms have gained increasing popularity in the recent decade because of their significant potential to tackle computationally intractable optimization dilemma in medical, engineering, military, space and industry fields. The main reason behind the success rate of nature inspired algorithms is their capability to solve problems. The nature inspired optimization techniques provide adaptive computational tools for the complex optimization problems and diversified engineering applications. Tentative Table of Contents/Topic Coverage: - Neural Computation - Evolutionary Computing Methods - Neuroscience driven AI Inspired Algorithms - Biological System based algorithms - Hybrid and Intelligent Computing Algorithms - Application of Natural Computing - Review and State of art analysis of Optimization algorithms - Molecular and Quantum computing applications - Swarm Intelligence - Population based algorithm and other optimizations
Link prediction is required to understand the evolutionary theory of computing for different social networks. However, the stochastic growth of the social network leads to various challenges in identifying hidden links, such as representation of graph, distinction between spurious and missing links, selection of link prediction techniques comprised of network features, and identification of network types. Hidden Link Prediction in Stochastic Social Networks concentrates on the foremost techniques of hidden link predictions in stochastic social networks including methods and approaches that involve similarity index techniques, matrix factorization, reinforcement, models, and graph representations and community detections. The book also includes miscellaneous methods of different modalities in deep learning, agent-driven AI techniques, and automata-driven systems and will improve the understanding and development of automated machine learning systems for supervised, unsupervised, and recommendation-driven learning systems. It is intended for use by data scientists, technology developers, professionals, students, and researchers.
|
You may like...
Freedom - Stories Celebrating the…
Amnesty International USA
Paperback
Dentition - According to Some of the…
Alexander Christian Becker
Paperback
R350
Discovery Miles 3 500
|