Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 25 of 42 matches in All Departments
The availability of many-core computing platforms enables a wide variety of technical solutions for systems across the embedded, high-performance and cloud computing domains. However, large scale manycore systems are notoriously hard to optimise. Choices regarding resource allocation alone can account for wide variability in timeliness and energy dissipation (up to several orders of magnitude). Dynamic Resource Allocation in Embedded, High-Performance and Cloud Computing covers dynamic resource allocation heuristics for manycore systems, aiming to provide appropriate guarantees on performance and energy efficiency. It addresses different types of systems, aiming to harmonise the approaches to dynamic allocation across the complete spectrum between systems with little flexibility and strict real-time guarantees all the way to highly dynamic systems with soft performance requirements. Technical topics presented in the book include: * Load and Resource Models* Admission Control* Feedback-based Allocation and Optimisation* Search-based Allocation Heuristics* Distributed Allocation based on Swarm Intelligence* Value-Based AllocationEach of the topics is illustrated with examples based on realistic computational platforms such as Network-on-Chip manycore processors, grids and private cloud environments.
This book presents applications of machine learning techniques in processing multimedia large-scale data. Multimedia such as text, image, audio, video, and graphics stands as one of the most demanding and exciting aspects of the information era. The book discusses new challenges faced by researchers in dealing with these large-scale data and also presents innovative solutions to address several potential research problems, e.g., enabling comprehensive visual classification to fill the semantic gap by exploring large-scale data, offering a promising frontier for detailed multimedia understanding, as well as extract patterns and making effective decisions by analyzing the large collection of data.
This book contains high-quality research articles and reviews that promote research and reflect the most recent advances in intelligent wavelet based techniques for advanced multimedia applications as well as other emerging areas. In recent time, wavelet transforms have become useful in many signal, image and video processing applications, especially for multimedia security and surveillance. A few applications of wavelets in security and surveillance are watermarking, fusion, steganography, object detection, tracking, motion recognition and intention recognition, etc. Wavelets are well capable of analyzing signal, image and video at different resolution levels, popularly known as multiresolution analysis. The multiresolution analysis is advantageous in multimedia security and surveillance applications. It provides flexibility in selection of different resolution levels that leads to better accuracy. Furthermore, recently sparse representation has become an advancement to analyze wavelet coefficients. It is observed that wavelet transforms possess the invariance property which makes them suitable for many vision applications. This book provides a concise overview of the current state of the art and disseminates some of the novel and exciting ideas and techniques. In addition, it is also helpful for the senior undergraduate and graduate students, researcher, academicians, IT professional and providers, citizens, customers as well as policy makers working in this area as well as other emerging applications demanding state-of-the-art wavelet based multimedia applications.
This book presents applications of machine learning techniques in processing multimedia large-scale data. Multimedia such as text, image, audio, video, and graphics stands as one of the most demanding and exciting aspects of the information era. The book discusses new challenges faced by researchers in dealing with these large-scale data and also presents innovative solutions to address several potential research problems, e.g., enabling comprehensive visual classification to fill the semantic gap by exploring large-scale data, offering a promising frontier for detailed multimedia understanding, as well as extract patterns and making effective decisions by analyzing the large collection of data.
Internet of Multimedia Things (IoMT): Techniques and Applications disseminates research efforts in the security and resilience of intelligent data-centric critical systems to support advanced research in this area. Sections cover the background of IoMT Architectures and Technologies, describe the problems that arise in IoMT Computing and protocols, and illustrate the application of IoMT on Industrial applications. The book will be beneficial for engineers, developers, solution designers, architects, system engineers and specialists from professional environments interested in the IoMT to seek appropriate solutions to their specific problems.
This book contains high-quality research articles and reviews that promote research and reflect the most recent advances in intelligent wavelet based techniques for advanced multimedia applications as well as other emerging areas. In recent time, wavelet transforms have become useful in many signal, image and video processing applications, especially for multimedia security and surveillance. A few applications of wavelets in security and surveillance are watermarking, fusion, steganography, object detection, tracking, motion recognition and intention recognition, etc. Wavelets are well capable of analyzing signal, image and video at different resolution levels, popularly known as multiresolution analysis. The multiresolution analysis is advantageous in multimedia security and surveillance applications. It provides flexibility in selection of different resolution levels that leads to better accuracy. Furthermore, recently sparse representation has become an advancement to analyze wavelet coefficients. It is observed that wavelet transforms possess the invariance property which makes them suitable for many vision applications. This book provides a concise overview of the current state of the art and disseminates some of the novel and exciting ideas and techniques. In addition, it is also helpful for the senior undergraduate and graduate students, researcher, academicians, IT professional and providers, citizens, customers as well as policy makers working in this area as well as other emerging applications demanding state-of-the-art wavelet based multimedia applications.
This book gathers high-quality research articles and reviews that reflect the latest advances in the smart network-inspired paradigm and address current issues in IoT applications as well as other emerging areas. Featuring work from both academic and industry researchers, the book provides a concise overview of the current state of the art and highlights some of the most promising and exciting new ideas and techniques. Accordingly, it offers a valuable resource for senior undergraduate and graduate students, researchers, policymakers, and IT professionals and providers working in areas that call for state-of-the-art networks and IoT applications.
This handbook is organized under three major parts. The first part of this handbook deals with multimedia security for emerging applications. The chapters include basic concepts of multimedia tools and applications, biological and behavioral biometrics, effective multimedia encryption and secure watermarking techniques for emerging applications, an adaptive face identification approach for android mobile devices, and multimedia using chaotic and perceptual hashing function. The second part of this handbook focuses on multimedia processing for various potential applications. The chapter includes a detail survey of image processing based automated glaucoma detection techniques and role of de-noising, recent study of dictionary learning based image reconstruction techniques for analyzing the big medical data, brief introduction of quantum image processing and it applications, a segmentation-less efficient Alzheimer detection approach, object recognition, image enhancements and de-noising techniques for emerging applications, improved performance of image compression approach, and automated detection of eye related diseases using digital image processing. The third part of this handbook introduces multimedia applications. The chapter includes the extensive survey on the role of multimedia in medicine and multimedia forensics classification, a finger based authentication system for e-health security, analysis of recently developed deep learning techniques for emotion and activity recognition. Further, the book introduce a case study on change of ECG according to time for user identification, role of multimedia in big data, cloud computing, the Internet of things (IoT) and blockchain environment in detail for real life applications. This handbook targets researchers, policy makers, programmers and industry professionals in creating new knowledge for developing efficient techniques/framework for multimedia applications. Advanced level students studying computer science, specifically security and multimedia will find this book useful as a reference.
This thesis proposes new power converter topologies suitable for aircraft systems. It also proposes both AC-DC and DC-DC types of converters for different electrical loads to improve the performance these systems. To increase fuel efficiency and reduce environmental impacts, less efficient non-electrical aircraft systems are being replaced by electrical systems. However, more electrical systems requires more electrical power to be generated in the aircraft. The increased consumption of electrical power in both civil and military aircrafts has necessitated the use of more efficient electrical power conversion technologies. This book presents acomprehensive mathematical analysis and the design and digital simulation of the power converters. Subsequently it discusses the construction of the hardware prototypes of each converter and the experimental tests carried out to verify the benefits of the proposed solutions in comparison to the existing solutions.
This book offers an essential guide to IoT Security, Smart Cities, IoT Applications, etc. In addition, it presents a structured introduction to the subject of destination marketing and an exhaustive review on the challenges of information security in smart and intelligent applications, especially for IoT and big data contexts. Highlighting the latest research on security in smart cities, it addresses essential models, applications, and challenges. Written in plain and straightforward language, the book offers a self-contained resource for readers with no prior background in the field. Primarily intended for students in Information Security and IoT applications (including smart cities systems and data heterogeneity), it will also greatly benefit academic researchers, IT professionals, policymakers and legislators. It is well suited as a reference book for both undergraduate and graduate courses on information security approaches, the Internet of Things, and real-world intelligent applications.
This thesis proposes new power converter topologies suitable for aircraft systems. It also proposes both AC-DC and DC-DC types of converters for different electrical loads to improve the performance these systems. To increase fuel efficiency and reduce environmental impacts, less efficient non-electrical aircraft systems are being replaced by electrical systems. However, more electrical systems requires more electrical power to be generated in the aircraft. The increased consumption of electrical power in both civil and military aircrafts has necessitated the use of more efficient electrical power conversion technologies. This book presents acomprehensive mathematical analysis and the design and digital simulation of the power converters. Subsequently it discusses the construction of the hardware prototypes of each converter and the experimental tests carried out to verify the benefits of the proposed solutions in comparison to the existing solutions.
This book presents medical image watermarking techniques and algorithms for telemedicine and other emerging applications. This book emphasizes on medical image watermarking to ensure the authenticity of transmitted medical information. It begins with an introduction of digital watermarking, important characteristics, novel applications, different watermarking attacks and standard benchmark tools. This book also covers spatial and transform domain medical image watermarking techniques and their merits and limitations. The authors have developed improved/novel watermarking techniques for telemedicine applications that offer higher robustness, better perceptual quality and increased embedding capacity and secure watermark. The suggested methods may find potential applications in the prevention of patient identity theft and health data management issues which is a growing concern in telemedicine applications. This book provides a sound platform for understanding the medical image watermarking paradigm for researchers in the field and advanced-level students. Industry professionals working in this field, as well as other emerging applications demanding robust and secure watermarking will find this book useful as a reference.
This book presents medical image watermarking techniques and algorithms for telemedicine and other emerging applications. This book emphasizes on medical image watermarking to ensure the authenticity of transmitted medical information. It begins with an introduction of digital watermarking, important characteristics, novel applications, different watermarking attacks and standard benchmark tools. This book also covers spatial and transform domain medical image watermarking techniques and their merits and limitations. The authors have developed improved/novel watermarking techniques for telemedicine applications that offer higher robustness, better perceptual quality and increased embedding capacity and secure watermark. The suggested methods may find potential applications in the prevention of patient identity theft and health data management issues which is a growing concern in telemedicine applications. This book provides a sound platform for understanding the medical image watermarking paradigm for researchers in the field and advanced-level students. Industry professionals working in this field, as well as other emerging applications demanding robust and secure watermarking will find this book useful as a reference.
Digital Image Enhancement and Reconstruction: Techniques and Applications explores different concepts and techniques used for the enhancement as well as reconstruction of low-quality images. Most real-life applications require good quality images to gain maximum performance, however, the quality of the images captured in real-world scenarios is often very unsatisfactory. Most commonly, images are noisy, blurry, hazy, tiny, and hence need to pass through image enhancement and/or reconstruction algorithms before they can be processed by image analysis applications. This book comprehensively explores application-specific enhancement and reconstruction techniques including satellite image enhancement, face hallucination, low-resolution face recognition, medical image enhancement and reconstruction, reconstruction of underwater images, text image enhancement, biometrics, etc. Chapters will present a detailed discussion of the challenges faced in handling each particular kind of image, analysis of the best available solutions, and an exploration of applications and future directions. The book provides readers with a deep dive into denoising, dehazing, super-resolution, and use of soft computing across a range of engineering applications.
E-health applications such as tele-medicine, tele-radiology, tele-ophthalmology, and tele-diagnosis are very promising and have immense potential to improve global healthcare. They can improve access, equity, and quality through the connection of healthcare facilities and healthcare professionals, diminishing geographical and physical barriers. One critical issue, however, is related to the security of data transmission and access to the technologies of medical information. Currently, medical-related identity theft costs billions of dollars each year and altered medical information can put a person's health at risk through misdiagnosis, delayed treatment or incorrect prescriptions. Yet, the use of hand-held devices for storing, accessing, and transmitting medical information is outpacing the privacy and security protections on those devices. Researchers are starting to develop some imperceptible marks to ensure the tamper-proofing, cost effective, and guaranteed originality of the medical records. However, the robustness, security and efficient image archiving and retrieval of medical data information against these cyberattacks is a challenging area for researchers in the field of e-health applications. Intelligent Data Security Solutions for e-Health Applications focuses on cutting-edge academic and industry-related research in this field, with particular emphasis on interdisciplinary approaches and novel techniques to provide security solutions for smart applications. The book provides an overview of cutting-edge security techniques and ideas to help graduate students, researchers, as well as IT professionals who want to understand the opportunities and challenges of using emerging techniques and algorithms for designing and developing more secure systems and methods for e-health applications.
This book gathers high-quality research articles and reviews that reflect the latest advances in the smart network-inspired paradigm and address current issues in IoT applications as well as other emerging areas. Featuring work from both academic and industry researchers, the book provides a concise overview of the current state of the art and highlights some of the most promising and exciting new ideas and techniques. Accordingly, it offers a valuable resource for senior undergraduate and graduate students, researchers, policymakers, and IT professionals and providers working in areas that call for state-of-the-art networks and IoT applications.
This handbook is organized under three major parts. The first part of this handbook deals with multimedia security for emerging applications. The chapters include basic concepts of multimedia tools and applications, biological and behavioral biometrics, effective multimedia encryption and secure watermarking techniques for emerging applications, an adaptive face identification approach for android mobile devices, and multimedia using chaotic and perceptual hashing function. The second part of this handbook focuses on multimedia processing for various potential applications. The chapter includes a detail survey of image processing based automated glaucoma detection techniques and role of de-noising, recent study of dictionary learning based image reconstruction techniques for analyzing the big medical data, brief introduction of quantum image processing and it applications, a segmentation-less efficient Alzheimer detection approach, object recognition, image enhancements and de-noising techniques for emerging applications, improved performance of image compression approach, and automated detection of eye related diseases using digital image processing. The third part of this handbook introduces multimedia applications. The chapter includes the extensive survey on the role of multimedia in medicine and multimedia forensics classification, a finger based authentication system for e-health security, analysis of recently developed deep learning techniques for emotion and activity recognition. Further, the book introduce a case study on change of ECG according to time for user identification, role of multimedia in big data, cloud computing, the Internet of things (IoT) and blockchain environment in detail for real life applications. This handbook targets researchers, policy makers, programmers and industry professionals in creating new knowledge for developing efficient techniques/framework for multimedia applications. Advanced level students studying computer science, specifically security and multimedia will find this book useful as a reference.
This book offers an essential guide to IoT Security, Smart Cities, IoT Applications, etc. In addition, it presents a structured introduction to the subject of destination marketing and an exhaustive review on the challenges of information security in smart and intelligent applications, especially for IoT and big data contexts. Highlighting the latest research on security in smart cities, it addresses essential models, applications, and challenges. Written in plain and straightforward language, the book offers a self-contained resource for readers with no prior background in the field. Primarily intended for students in Information Security and IoT applications (including smart cities systems and data heterogeneity), it will also greatly benefit academic researchers, IT professionals, policymakers and legislators. It is well suited as a reference book for both undergraduate and graduate courses on information security approaches, the Internet of Things, and real-world intelligent applications.
|
You may like...
ESV Thompson Chain-Reference Bible
Frank Charles Thompson
Hardcover
Eight Days In July - Inside The Zuma…
Qaanitah Hunter, Kaveel Singh, …
Paperback
(1)
A Book of Vagaries - Comprising the New…
William Irving Paulding
Paperback
R615
Discovery Miles 6 150
We Were Perfect Parents Until We Had…
Vanessa Raphaely, Karin Schimke
Paperback
|