Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 25 of 128 matches in All Departments
In recent years, most applications deal with constraint decision-making systems as problems are based on imprecise information and parameters. It is difficult to understand the nature of data based on applications and it requires a specific model for understanding the nature of the system. Further research on constraint decision-making systems in engineering is required. Constraint Decision-Making Systems in Engineering derives and explores several types of constraint decisions in engineering and focuses on new and innovative conclusions based on problems, robust and efficient systems, and linear and non-linear applications. Covering topics such as fault detection, data mining techniques, and knowledge-based management, this premier reference source is an essential resource for engineers, managers, computer scientists, students and educators of higher education, librarians, researchers, and academicians.
In recent years, technological advances have led to significant developments within a variety of business applications. In particular, data-driven research provides ample opportunity for enterprise growth, if utilized efficiently. Privacy and Security Policies in Big Data is a pivotal reference source for the latest research on innovative concepts on the management of security and privacy analytics within big data. Featuring extensive coverage on relevant areas such as kinetic knowledge, cognitive analytics, and parallel computing, this publication is an ideal resource for professionals, researchers, academicians, advanced-level students, and technology developers in the field of big data.
Modern society exists in a digital era in which high volumes of multimedia information exists. To optimize the management of this data, new methods are emerging for more efficient information retrieval. Web Semantics for Textual and Visual Information Retrieval is a pivotal reference source for the latest academic research on embedding and associating semantics with multimedia information to improve data retrieval techniques. Highlighting a range of pertinent topics such as automation, knowledge discovery, and social networking, this book is ideally designed for researchers, practitioners, students, and professionals interested in emerging trends in information retrieval.
This book extends the work from introduction of ubiquitous computing, to the Internet of things to security and to privacy aspects of ubiquitous computing. The uniqueness of this book is the combination of important fields like the Internet of things and ubiquitous computing. It assumes that the readers' goal is to achieve a complete understanding of IoT, smart computing, security issues, challenges and possible solutions. It is not oriented towards any specific use cases and security issues; privacy threats in ubiquitous computing problems are discussed across various domains. This book is motivating to address privacy threats in new inventions for a wide range of stakeholders like layman to educated users, villages to metros and national to global levels. This book contains numerous examples, case studies, technical descriptions, scenarios, procedures, algorithms and protocols. The main endeavour of this book is threat analysis and activity modelling of attacks in order to give an actual view of the ubiquitous computing applications. The unique approach will help readers for a better understanding.
Organizations are showing a remarkable interest in realizing knowledge management technologies and processes to adopt knowledge management as part of their overall strategy. However, even with the current advancement in technology, few organizations are entirely capable of developing critical organizational knowledge to achieve improved performance. Technological Innovations in Knowledge Management and Decision Support is a vital research publication that examines different knowledge management areas for organizational competitiveness, survival, and effectiveness. It also provides cutting-edge research techniques in related optimization methods and other automated techniques in real-world processes. Featuring a broad range of topics such as enterprise resource planning, neural networks, and image segmentation, this book is a critical resource for managers, IT specialists, healthcare and social sciences professionals, engineers, academicians, and researchers seeking research on effective knowledge management systems.
This book presents architectural solutions of wireless network and its variations. It basically deals with modeling, analysis, design and enhancement of different architectural parts of wireless network. The main aim of this book is to enhance the applications of wireless network by reducing and controlling its architectural issues. The book discusses efficiency and robustness of wireless network as a platform for communication and data transmission and also discusses some challenges and security issues such as limited hardware resources, unreliable communication, dynamic topology of some wireless networks, vulnerability and unsecure environment. This book is edited for users, academicians and researchers of wireless network. Broadly, topics include modeling of security enhancements, optimization model for network lifetime, modeling of aggregation systems and analyzing of troubleshooting techniques.
This book highlights essential concepts in connection with the traditional bat algorithm and its recent variants, as well as its application to find optimal solutions for a variety of real-world engineering and medical problems. Today, swarm intelligence-based meta-heuristic algorithms are extensively being used to address a wide range of real-world optimization problems due to their adaptability and robustness. Developed in 2009, the bat algorithm (BA) is one of the most successful swarm intelligence procedures, and has been used to tackle optimization tasks for more than a decade. The BA's mathematical model is quite straightforward and easy to understand and enhance, compared to other swarm approaches. Hence, it has attracted the attention of researchers who are working to find optimal solutions in a diverse range of domains, such as N-dimensional numerical optimization, constrained/unconstrained optimization and linear/nonlinear optimization problems. Along with the traditional BA, its enhanced versions are now also being used to solve optimization problems in science, engineering and medical applications around the globe.
Recent advancements and innovations in medical image and data processing have led to a need for robust and secure mechanisms to transfer images and signals over the internet and maintain copyright protection. The Handbook of Research on Information Security in Biomedical Signal Processing provides emerging research on security in biomedical data as well as techniques for accurate reading and further processing. While highlighting topics such as image processing, secure access, and watermarking, this publication explores advanced models and algorithms in information security in the modern healthcare system. This publication is a vital resource for academicians, medical professionals, technology developers, researchers, students, and practitioners seeking current research on intelligent techniques in medical data security.
Metaheuristic algorithms are present in various applications for different domains. Recently, researchers have conducted studies on the effectiveness of these algorithms in providing optimal solutions to complicated problems. Advancements in Applied Metaheuristic Computing is a crucial reference source for the latest empirical research on methods and approaches that include metaheuristics for further system improvements, and it offers outcomes of employing optimization algorithms. Featuring coverage on a broad range of topics such as manufacturing, genetic programming, and medical imaging, this publication is ideal for researchers, academicians, advanced-level students, and technology developers seeking current research on the use of optimization algorithms in several applications.
This book includes research articles and expository papers on the applications of artificial intelligence and big data analytics to battle the pandemic. In the context of COVID-19, this book focuses on how big data analytic and artificial intelligence help fight COVID-19. The book is divided into four parts. The first part discusses the forecasting and visualization of the COVID-19 data. The second part describes applications of artificial intelligence in the COVID-19 diagnosis of chest X-Ray imaging. The third part discusses the insights of artificial intelligence to stop spread of COVID-19, while the last part presents deep learning and big data analytics which help fight the COVID-19.
This book proposes new technologies and discusses future solutions for ICT design infrastructures, as reflected in high-quality papers presented at the 5th International Conference on ICT for Sustainable Development (ICT4SD 2020), held in Goa, India, on 23-24 July 2020. The conference provided a valuable forum for cutting-edge research discussions among pioneering researchers, scientists, industrial engineers, and students from all around the world. Bringing together experts from different countries, the book explores a range of central issues from an international perspective.
This book introduces research presented at the "International Conference on Artificial Intelligence: Advances and Applications-2019 (ICAIAA 2019)," a two-day conference and workshop bringing together leading academicians, researchers as well as students to share their experiences and findings on all aspects of engineering applications of artificial intelligence. The book covers research in the areas of artificial intelligence, machine learning, and deep learning applications in health care, agriculture, business and security. It also includes research in core concepts of computer networks, intelligent system design and deployment, real-time systems, WSN, sensors and sensor nodes, SDN and NFV. As such it is a valuable resource for students, academics and practitioners in industry working on AI applications.
This book presents a cutting-edge research procedure in the Nature-Inspired Computing (NIC) domain and its connections with computational intelligence areas in real-world engineering applications. It introduces readers to a broad range of algorithms, such as genetic algorithms, particle swarm optimization, the firefly algorithm, flower pollination algorithm, collision-based optimization algorithm, bat algorithm, ant colony optimization, and multi-agent systems. In turn, it provides an overview of meta-heuristic algorithms, comparing the advantages and disadvantages of each. Moreover, the book provides a brief outline of the integration of nature-inspired computing techniques and various computational intelligence paradigms, and highlights nature-inspired computing techniques in a range of applications, including: evolutionary robotics, sports training planning, assessment of water distribution systems, flood simulation and forecasting, traffic control, gene expression analysis, antenna array design, and scheduling/dynamic resource management.
This book explores the fundamentals of smart cities along with issues, controversies, problems and applications concerning security and privacy in smart city development. Future smart cities must incorporate innovations like smart rainwater harvesting, smart street lighting, digital identity management, solar energy, intelligent transport systems and emerging communication applications. The target audience of the book includes professionals, researchers, academics, advanced-level students, technology developers, doctors and biologists working in the field of smart city applications. Professionals will find innovative ideas for marketing and research, while developers can use various technologies like IoTand block chain to develop the applications discussed here. As the book shows, by integrating new technologies, the cities of the future are becoming a reality today.
This book proposes new algorithms to ensure secured communications and prevent unauthorized data exchange in secured multimedia systems. Focusing on numerous applications' algorithms and scenarios, it offers an in-depth analysis of data hiding technologies including watermarking, cryptography, encryption, copy control, and authentication. The authors present a framework for visual data hiding technologies that resolves emerging problems of modern multimedia applications in several contexts including the medical, healthcare, education, and wireless communication networking domains. Further, it introduces several intelligent security techniques with real-time implementation. As part of its comprehensive coverage, the book discusses contemporary multimedia authentication and fingerprinting techniques, while also proposing personal authentication/recognition systems based on hand images, surveillance system security using gait recognition, face recognition under restricted constraints such as dry/wet face conditions, and three-dimensional face identification using the approach developed here. This book equips perception technology professionals with the latest technologies, techniques, and strategies for multimedia security systems, offering a valuable resource for engineers and researchers working to develop security systems.
This volume comprises of 21 selected chapters, including two overview chapters devoted to abdominal imaging in clinical applications supported computer aided diagnosis approaches as well as different techniques for solving the pectoral muscle extraction problem in the preprocessing part of the CAD systems for detecting breast cancer in its early stage using digital mammograms. The aim of this book is to stimulate further research in medical imaging applications based algorithmic and computer based approaches and utilize them in real-world clinical applications. The book is divided into four parts, Part-I: Clinical Applications of Medical Imaging, Part-II: Classification and clustering, Part-III: Computer Aided Diagnosis (CAD) Tools and Case Studies and Part-IV: Bio-inspiring based Computer Aided diagnosis techniques.
Microwave photonics and information optics provide high bandwidth and precision along with ultrafast speed at a low cost. In order to reduce noise at the communication trans-receivers, scattering in the devices needs to be decreased, which can be achieved by replacing optoelectronic devices with photonic devices because in the latter only photons propagate electromagnetic waves. Contemporary Developments in High-Frequency Photonic Devices is a crucial research book that examines high-frequency photonics and their applications in communication engineering. Featuring coverage on a wide range of topics such as metamaterials, optoelectronic devices, and plasmonics, this book is excellent for students, researchers, engineers, and professionals.
Advanced techniques in image processing have led to many innovations supporting the medical field, especially in the area of disease diagnosis. Biomedical imaging is an essential part of early disease detection and often considered a first step in the proper management of medical pathological conditions. Classification and Clustering in Biomedical Signal Processing focuses on existing and proposed methods for medical imaging, signal processing, and analysis for the purposes of diagnosing and monitoring patient conditions. Featuring the most recent empirical research findings in the areas of signal processing for biomedical applications with an emphasis on classification and clustering techniques, this essential publication is designed for use by medical professionals, IT developers, and advanced-level graduate students.
This book addresses a broad range of topics concerning machine learning, big data, the Internet of things (IoT), and security in the IoT. Its goal is to bring together several innovative studies on these areas, in order to help researchers, engineers, and designers in several interdisciplinary domains pursue related applications. It presents an overview of the various algorithms used, focusing on the advantages and disadvantages of each in the fields of machine learning and big data. It also covers next-generation computing paradigms that are expected to support wireless networking with high data transfer rates and autonomous decision-making capabilities. In turn, the book discusses IoT applications (e.g. healthcare applications) that generate a huge amount of sensor data and imaging data that must be handled correctly for further processing. In the traditional IoT ecosystem, cloud computing offers a solution for the efficient management of huge amounts of data, thanks to its ability to access shared resources and provide a common infrastructure in a ubiquitous manner. Though these new technologies are invaluable, they also reveal serious IoT security challenges. IoT applications are vulnerable to various types of attack such as eavesdropping, spoofing and false data injection, the man-in-the-middle attack, replay attack, denial-of-service attack, jamming attack, flooding attack, etc. These and other security issues in the Internet of things are explored in detail. In addition to highlighting outstanding research and recent advances from around the globe, the book reports on current challenges and future directions in the IoT. Accordingly, it offers engineers, professionals, researchers, and designers an applied-oriented resource to support them in a broad range of interdisciplinary areas.
The main target of this book is to raise the awareness about social networking systems design, implementation, security requirements, and approaches. The book entails related issues including computing, engineering, security, management, and organization policy. It interprets the design, implementation and security threats in the social networks and offers some solutions in this concern. It clarifies the authentication concept between servers to identity users. Most of the models that focus on protecting users' information are also included. This book introduces the Human-Interactive Security Protocols (HISPs) efficiently. Presenting different types of the social networking systems including the internet and mobile devices is one of the main targets of this book. This book includes the social network performance evaluation metrics. It compares various models and approaches used in the design of the social networks. This book includes various applications for the use of the social networks in the healthcare, e-commerce, crisis management, and academic applications. The book provides an extensive background for the development of social network science and its challenges. This book discusses the social networks integration to offer online services, such as instant messaging, email, file sharing, transferring patients' medical reports/images, location-based recommendations and many other functions. This book provides users, designers, engineers and managers with the valuable knowledge to build a better secured information transfer over the social networks. The book gathers remarkable materials from an international experts' panel to guide the readers during the analysis, design, implementation and security achievement for the social network systems. In this book, theories, practical guidance, and challenges are included to inspire designers and researchers. The book guides the engineers, designers, and researchers to exploit the intrinsic design of the social network systems.
This book explores several problems and their solutions regarding data analysis and prediction for industrial applications. Machine learning is a prominent topic in modern industries: its influence can be felt in many aspects of everyday life, as the world rapidly embraces big data and data analytics. Accordingly, there is a pressing need for novel and innovative algorithms to help us find effective solutions in industrial application areas such as media, healthcare, travel, finance, and retail. In all of these areas, data is the crucial parameter, and the main key to unlocking the value of industry. The book presents a range of intelligent algorithms that can be used to filter useful information in the above-mentioned application areas and efficiently solve particular problems. Its main objective is to raise awareness for this important field among students, researchers, and industrial practitioners.
Video is one of the most important forms of multimedia available, as it is utilized for security purposes, to transmit information, promote safety, and provide entertainment. As motion is the most integral element in videos, it is important that motion detection systems and algorithms meet specific requirements to achieve accurate detection of real time events. Feature Detectors and Motion Detection in Video Processing explores innovative methods and approaches to analyzing and retrieving video images. Featuring empirical research and significant frameworks regarding feature detectors and descriptor algorithms, the book is a critical reference source for professionals, researchers, advanced-level students, technology developers, and academicians.
This book highlights state-of-the-art research on big data and the Internet of Things (IoT), along with related areas to ensure efficient and Internet-compatible IoT systems. It not only discusses big data security and privacy challenges, but also energy-efficient approaches to improving virtual machine placement in cloud computing environments. Big data and the Internet of Things (IoT) are ultimately two sides of the same coin, yet extracting, analyzing and managing IoT data poses a serious challenge. Accordingly, proper analytics infrastructures/platforms should be used to analyze IoT data. Information technology (IT) allows people to upload, retrieve, store and collect information, which ultimately forms big data. The use of big data analytics has grown tremendously in just the past few years. At the same time, the IoT has entered the public consciousness, sparking people's imaginations as to what a fully connected world can offer. Further, the book discusses the analysis of real-time big data to derive actionable intelligence in enterprise applications in several domains, such as in industry and agriculture. It explores possible automated solutions in daily life, including structures for smart cities and automated home systems based on IoT technology, as well as health care systems that manage large amounts of data (big data) to improve clinical decisions. The book addresses the security and privacy of the IoT and big data technologies, while also revealing the impact of IoT technologies on several scenarios in smart cities design. Intended as a comprehensive introduction, it offers in-depth analysis and provides scientists, engineers and professionals the latest techniques, frameworks and strategies used in IoT and big data technologies.
This comprehensive book focuses on better big-data security for healthcare organizations. Following an extensive introduction to the Internet of Things (IoT) in healthcare including challenging topics and scenarios, it offers an in-depth analysis of medical body area networks with the 5th generation of IoT communication technology along with its nanotechnology. It also describes a novel strategic framework and computationally intelligent model to measure possible security vulnerabilities in the context of e-health. Moreover, the book addresses healthcare systems that handle large volumes of data driven by patients' records and health/personal information, including big-data-based knowledge management systems to support clinical decisions. Several of the issues faced in storing/processing big data are presented along with the available tools, technologies and algorithms to deal with those problems as well as a case study in healthcare analytics. Addressing trust, privacy, and security issues as well as the IoT and big-data challenges, the book highlights the advances in the field to guide engineers developing different IoT devices and evaluating the performance of different IoT techniques. Additionally, it explores the impact of such technologies on public, private, community, and hybrid scenarios in healthcare. This book offers professionals, scientists and engineers the latest technologies, techniques, and strategies for IoT and big data. |
You may like...
The Retail Revolution in Health Care
Myron D Fottler, Donna M. Malvey
Hardcover
R1,678
Discovery Miles 16 780
|