Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 11 of 11 matches in All Departments
Recent advances in socio-cognitive and affective computing require further study as countless benefits and opportunities have emerged from these innovative technologies that may be useful in a number of contexts throughout daily life. In order to ensure these technologies are appropriately utilized across sectors, the challenges and strategies for adoption as well as potential uses must be thoroughly considered. Principles and Applications of Socio-Cognitive and Affective Computing discusses several aspects of affective interactions and concepts in affective computing, the fundamentals of emotions, and emerging research and exciting techniques for bridging the emotional disparity between humans and machines, all within the context of interactions. The book also considers problem and solution guidelines emerging in cognitive computing, thus summarizing the roadmap of current machine computational intelligence techniques for affective computing. Covering a range of topics such as social interaction, robotics, and virtual reality, this reference work is crucial for scientists, engineers, industry professionals, academicians, researchers, scholars, practitioners, instructors, and students.
With the rapid advancement in technology, a myriad of new threats have emerged in online environments. The broad spectrum of these digital risks requires new and innovative methods for protection against cybercrimes. Combating Security Breaches and Criminal Activity in the Digital Sphere is a pivotal reference source for the latest scholarly research on current trends in cyber forensic investigations, focusing on advanced techniques for protecting information security and preventing potential exploitation for online users. Featuring law enforcement perspectives, theoretical foundations, and forensic methods, this book is ideally designed for policy makers, analysts, researchers, technology developers, and upper-level students.
The rate of cybercrimes is increasing because of the fast-paced advancements in computer and internet technology. Crimes employing mobile devices, data embedding/mining systems, computers, network communications, or any malware impose a huge threat to data security. Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems addresses current problems and issues emerging in cyber forensics and investigations and proposes new solutions that can be adopted and implemented to counter security breaches within various organizations. The publication examines a variety of topics such as advanced techniques for forensic developments in computer and communication-link environments and legal perspectives including procedures for cyber investigations, standards, and policies. It is designed for policymakers, forensic analysts, technology developers, security administrators, academicians, researchers, and students.
This book presents the proceedings of the International Virtual Conference on Industry 4.0 (IVCI4.0 2020). This conference brings together specialists from the academia and industry sectors to promote the exchange of knowledge, ideas, and information on the latest developments and applied technologies in the field of Industry 4.0. The book discusses a wide range of topics such as the design of smart and intelligent products, developments in recent technologies, rapid prototyping and reverse engineering, multistage manufacturing processes, manufacturing automation in the Industry 4.0 model, cloud-based products, and cyber-physical and reconfigurable systems, etc. The volume supports the transfer of vital knowledge to the next generation of academics and practitioners.
Humans have the most advanced method of communication, which is known as natural language. While humans can use computers to send voice and text messages to each other, computers do not innately know how to process natural language. In recent years, deep learning has primarily transformed the perspectives of a variety of fields in artificial intelligence (AI), including speech, vision, and natural language processing (NLP). The extensive success of deep learning in a wide variety of applications has served as a benchmark for the many downstream tasks in AI. The field of computer vision has taken great leaps in recent years and surpassed humans in tasks related to detecting and labeling objects thanks to advances in deep learning and neural networks. Deep Learning Research Applications for Natural Language Processing explains the concepts and state-of-the-art research in the fields of NLP, speech, and computer vision. It provides insights into using the tools and libraries in Python for real-world applications. Covering topics such as deep learning algorithms, neural networks, and advanced prediction, this premier reference source is an excellent resource for computational linguists, software engineers, IT managers, computer scientists, students and faculty of higher education, libraries, researchers, and academicians.
This book presents the proceedings of the International Virtual Conference on Industry 4.0 (IVCI4.0 2020). This conference brings together specialists from the academia and industry sectors to promote the exchange of knowledge, ideas, and information on the latest developments and applied technologies in the field of Industry 4.0. The book discusses a wide range of topics such as the design of smart and intelligent products, developments in recent technologies, rapid prototyping and reverse engineering, multistage manufacturing processes, manufacturing automation in the Industry 4.0 model, cloud-based products, and cyber-physical and reconfigurable systems, etc. The volume supports the transfer of vital knowledge to the next generation of academics and practitioners.
This book constitutes thoroughly refereed post-conference proceedings of the International Applied Soft Computing and Communication Networks (ACN 2020) held in VIT, Chennai, India, during October 14-17, 2020. The research papers presented were carefully reviewed and selected from several initial submissions. The book is directed to the researchers and scientists engaged in various fields of intelligent systems.
Recent advances in socio-cognitive and affective computing require further study as countless benefits and opportunities have emerged from these innovative technologies that may be useful in a number of contexts throughout daily life. In order to ensure these technologies are appropriately utilized across sectors, the challenges and strategies for adoption as well as potential uses must be thoroughly considered. Principles and Applications of Socio-Cognitive and Affective Computing discusses several aspects of affective interactions and concepts in affective computing, the fundamentals of emotions, and emerging research and exciting techniques for bridging the emotional disparity between humans and machines, all within the context of interactions. The book also considers problem and solution guidelines emerging in cognitive computing, thus summarizing the roadmap of current machine computational intelligence techniques for affective computing. Covering a range of topics such as social interaction, robotics, and virtual reality, this reference work is crucial for scientists, engineers, industry professionals, academicians, researchers, scholars, practitioners, instructors, and students.
The rate of cybercrimes is increasing because of the fast-paced advancements in computer and internet technology. Crimes employing mobile devices, data embedding/mining systems, computers, network communications, or any malware impose a huge threat to data security. Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems addresses current problems and issues emerging in cyber forensics and investigations and proposes new solutions that can be adopted and implemented to counter security breaches within various organizations. The publication examines a variety of topics such as advanced techniques for forensic developments in computer and communication-link environments and legal perspectives including procedures for cyber investigations, standards, and policies. It is designed for policymakers, forensic analysts, technology developers, security administrators, academicians, researchers, and students.
This book presents the need for intrusion detection system as it has become an essential concern with the growing use of internet and increased network attacks such as virus, Trojan horse, worms and creative hackers. In addition, the basic details about the historic origin of IDS, the types of IDS, their deployment schemes and general architecture are considered. IDS using various machine learning techniques like fuzzy logic, genetic algorithm, neural network, decision tree etc are discussed and their pros and cons are discussed. Another potential approach is ensemble learning, which have been successfully applied to IDS for differentiating normal and anomalous types. In this book, various ensemble approaches like neuro-genetic, neuro-fuzzy, neurotree etc are explained. The implementation of these IDS depends again on the requirement of the security administrator. The IDS discussed in this book are adaptive to new environments by updating the audit data with recent attacks. If new attacks are identified these approaches can store the attack patterns in log generator for detecting future attacks.
|
You may like...
Ratels Aan Die Lomba - Die Storie Van…
Leopold Scholtz
Paperback
(4)
Foucault and the Modern International…
Philippe Bonditti, Didier Bigo, …
Hardcover
The Big Con - How The Consulting…
Mariana Mazzucato, Rosie Collington
Paperback
|