Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 11 of 11 matches in All Departments
The differential quadrature hierarchical finite element method (DQHFEM) was proposed by Bo Liu. This method incorporated the advantages and the latest research achievements of the hierarchical finite element method (HFEM), the differential quadrature method (DQM) and the isogeometric analysis (IGA). The DQHFEM also overcame many limitations or difficulties of the three methods.This unique compendium systemically introduces the construction of various DQHFEM elements of commonly used geometric shapes like triangle, tetrahedrons, pyramids, etc. Abundant examples are also included such as statics and dynamics, isotropic materials and composites, linear and nonlinear problems, plates as well as shells and solid structures.This useful reference text focuses largely on numerical algorithms, but also introduces some latest advances on high order mesh generation, which often has been regarded as the major bottle neck for the wide application of high order FEM.
This book covers and makes four major contributions: 1) analyzing and surveying the pros and cons of current approaches for identifying rumor sources on complex networks; 2) proposing a novel approach to identify rumor sources in time-varying networks; 3) developing a fast approach to identify multiple rumor sources; 4) proposing a community-based method to overcome the scalability issue in this research area. These contributions enable rumor source identification to be applied effectively in real-world networks, and eventually diminish rumor damages, which the authors rigorously illustrate in this book. In the modern world, the ubiquity of networks has made us vulnerable to various risks. For instance, viruses propagate throughout the Internet and infect millions of computers. Misinformation spreads incredibly fast in online social networks, such as Facebook and Twitter. Infectious diseases, such as SARS, H1N1 or Ebola, have spread geographically and killed hundreds of thousands people. In essence, all of these situations can be modeled as a rumor spreading through a network, where the goal is to find the source of the rumor so as to control and prevent network risks. So far, extensive work has been done to develop new approaches to effectively identify rumor sources. However, current approaches still suffer from critical weaknesses. The most serious one is the complex spatiotemporal diffusion process of rumors in time-varying networks, which is the bottleneck of current approaches. The second problem lies in the expensively computational complexity of identifying multiple rumor sources. The third important issue is the huge scale of the underlying networks, which makes it difficult to develop efficient strategies to quickly and accurately identify rumor sources. These weaknesses prevent rumor source identification from being applied in a broader range of real-world applications. This book aims to analyze and address these issues to make rumor source identification more effective and applicable in the real world. The authors propose a novel reverse dissemination strategy to narrow down the scale of suspicious sources, which dramatically promotes the efficiency of their method. The authors then develop a Maximum-likelihood estimator, which can pin point the true source from the suspects with high accuracy. For the scalability issue in rumor source identification, the authors explore sensor techniques and develop a community structure based method. Then the authors take the advantage of the linear correlation between rumor spreading time and infection distance, and develop a fast method to locate the rumor diffusion source. Theoretical analysis proves the efficiency of the proposed method, and the experiment results verify the significant advantages of the proposed method in large-scale networks. This book targets graduate and post-graduate students studying computer science and networking. Researchers and professionals working in network security, propagation models and other related topics, will also be interested in this book.
Plant cells house highly dynamic cytoskeletal networks of microtubules and actin microfilaments. They constantly undergo remodeling to fulfill their roles in supporting cell division, enlargement, and differentiation. Following early studies on structural aspects of the networks, recent breakthroughs have connected them with more and more intracellular events essential for plant growth and development. Advanced technologies in cell biology (live-cell imaging in particular), molecular genetics, genomics, and proteomics have revolutionized this field of study. Stories summarized in this book may inspire enthusiastic scientists to pursue new directions toward understanding functions of the plant cytoskeleton. The Plant Cytoskeleton is divided into three sections: 1) Molecular Basis of the Plant Cytoskeleton; 2) Cytoskeletal Reorganization in Plant Cell Division; and 3) The Cytoskeleton in Plant Growth and Development. This book is aimed at serving as a resource for anyone who wishes to learn about the plant cytoskeleton beyond ordinary textbooks. "
Computational intelligence techniques are becoming more and more important for automated problem solving nowadays. Due to the growing complexity of industrial applications and the increasingly tight time-to-market requirements, the time available for thorough problem analysis and development of tailored solution methods is decreasing. There is no doubt that this trend will continue in the foreseeable future. Hence, it is not surprising that robust and general automated problem solving methods with satisfactory performance are needed.
A critical challenge in deep learning is the vulnerability of deep learning networks to security attacks from intelligent cyber adversaries. Even innocuous perturbations to the training data can be used to manipulate the behaviour of deep networks in unintended ways. In this book, we review the latest developments in adversarial attack technologies in computer vision; natural language processing; and cybersecurity with regard to multidimensional, textual and image data, sequence data, and temporal data. In turn, we assess the robustness properties of deep learning networks to produce a taxonomy of adversarial examples that characterises the security of learning systems using game theoretical adversarial deep learning algorithms. The state-of-the-art in adversarial perturbation-based privacy protection mechanisms is also reviewed. We propose new adversary types for game theoretical objectives in non-stationary computational learning environments. Proper quantification of the hypothesis set in the decision problems of our research leads to various functional problems, oracular problems, sampling tasks, and optimization problems. We also address the defence mechanisms currently available for deep learning models deployed in real-world environments. The learning theories used in these defence mechanisms concern data representations, feature manipulations, misclassifications costs, sensitivity landscapes, distributional robustness, and complexity classes of the adversarial deep learning algorithms and their applications. In closing, we propose future research directions in adversarial deep learning applications for resilient learning system design and review formalized learning assumptions concerning the attack surfaces and robustness characteristics of artificial intelligence applications so as to deconstruct the contemporary adversarial deep learning designs. Given its scope, the book will be of interest to Adversarial Machine Learning practitioners and Adversarial Artificial Intelligence researchers whose work involves the design and application of Adversarial Deep Learning.
Computational intelligence techniques are becoming more and more important for automated problem solving nowadays. Due to the growing complexity of industrial applications and the increasingly tight time-to-market requirements, the time available for thorough problem analysis and development of tailored solution methods is decreasing. There is no doubt that this trend will continue in the foreseeable future. Hence, it is not surprising that robust and general automated problem solving methods with satisfactory performance are needed.
This book constitutes the refereed proceedings at PAKDD Workshops 2013, affiliated with the 17th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD) held in Gold Coast, Australia in April 2013. The 47 revised full papers presented were carefully reviewed and selected from 92 submissions. The workshops affiliated with PAKDD 2013 include: Data Mining Applications in Industry and Government (DMApps), Data Analytics for Targeted Healthcare (DANTH), Quality Issues, Measures of Interestingness and Evaluation of Data Mining Models (QIMIE), Biologically Inspired Techniques for Data Mining (BDM), Constraint Discovery and Application (CDA), Cloud Service Discovery (CloudSD).
Plant cells house highly dynamic cytoskeletal networks of microtubules and actin microfilaments. They constantly undergo remodeling to fulfill their roles in supporting cell division, enlargement, and differentiation. Following early studies on structural aspects of the networks, recent breakthroughs have connected them with more and more intracellular events essential for plant growth and development. Advanced technologies in cell biology (live-cell imaging in particular), molecular genetics, genomics, and proteomics have revolutionized this field of study. Stories summarized in this book may inspire enthusiastic scientists to pursue new directions toward understanding functions of the plant cytoskeleton. The Plant Cytoskeleton is divided into three sections: 1) Molecular Basis of the Plant Cytoskeleton; 2) Cytoskeletal Reorganization in Plant Cell Division; and 3) The Cytoskeleton in Plant Growth and Development. This book is aimed at serving as a resource for anyone who wishes to learn about the plant cytoskeleton beyond ordinary textbooks.
This book provides a comprehensive study of the state of the art in location privacy for mobile applications. It presents an integrated five-part framework for location privacy research, which includes the analysis of location privacy definitions, attacks and adversaries, location privacy protection methods, location privacy metrics, and location-based mobile applications. In addition, it analyses the relationships between the various elements of location privacy, and elaborates on real-world attacks in a specific application. Furthermore, the book features case studies of three applications and shares valuable insights into future research directions. Shedding new light on key research issues in location privacy and promoting the advance and development of future location-based mobile applications, it will be of interest to a broad readership, from students to researchers and engineers in the field.
Molecular Dynamic Simulation: Fundamentals and Applications explains the basic principles of MD simulation and explores its recent developments and roles in advanced modeling approaches. The implementation of MD simulation and its application to various aspects of materials science and engineering including mechanical, thermal, mass transportation, and physical/chemical reaction problems are illustrated. Innovative modeling techniques that apply MD to explore the mechanics of typical nanomaterials and nanostructures and to characterize crystalline, amorphous, and liquid systems are also presented. The rich research experience of the authors in MD simulation will ensure that the readers are provided with both an in-depth understanding of MD simulation and clear technical guidance.
This new book compiles biographical sketches of top professionals in the field of anatomy and physiology research, as well as research summaries from a number of different focuses in these important fields.
|
You may like...
|