0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R2,500 - R5,000 (10)
  • -
Status
Brand

Showing 1 - 10 of 10 matches in All Departments

Semantically Based Clinical TCM Telemedicine Systems (Paperback, Softcover reprint of the original 1st ed. 2015): Allan K y... Semantically Based Clinical TCM Telemedicine Systems (Paperback, Softcover reprint of the original 1st ed. 2015)
Allan K y Wong, Jackei H.K. Wong, Wilfred W K Lin, Tharam S. Dillon, Elizabeth J. Chang
R3,421 Discovery Miles 34 210 Ships in 10 - 15 working days

Recent years have seen the development of two significant trends namely: the adoption of some Traditional Chinese Medicine Practices into mainstream Allopathic Western Medicine and the advent of the internet and broad band networks leading to an increased interest in the use of Telemedicine to deliver medical services. In this book, we see the convergence of these two trends leading to a semantically-based TCM Telemedicine system that utilizes an ontology to provide sharable knowledge in the TCM realm to achieve this. The underpinning research required the development of a three-layer architecture and an Ontology of the TCM knowledge. As TCM knowledge like all medical knowledge is not frozen in time it was important to develop an approach that would allow evolution of the Ontology when new evidence became available. In order for the system to be practically grounded it was important to work with an industry partner PuraPharm Group/HerbMiners Informatics Limited. This partnership was initiated through Professor Allan Wong and the Chairman of PuraPharm Group Mr. Abraham Chan. This led to the system being utilized in more than 20 Mobile Clinics in Hong Kong and 300 Hospitals in China. In order for these different deployments of the system to be coherent with the main core Ontology, it was necessary for us to develop an Ontology Driven Software System Generation approach.

Semantically Based Clinical TCM Telemedicine Systems (Hardcover, 2015 ed.): Allan K y Wong, Jackei H.K. Wong, Wilfred W K Lin,... Semantically Based Clinical TCM Telemedicine Systems (Hardcover, 2015 ed.)
Allan K y Wong, Jackei H.K. Wong, Wilfred W K Lin, Tharam S. Dillon, Elizabeth J. Chang
R2,957 Discovery Miles 29 570 Ships in 10 - 15 working days

Recent years have seen the development of two significant trends namely: the adoption of some Traditional Chinese Medicine Practices into mainstream Allopathic Western Medicine and the advent of the internet and broad band networks leading to an increased interest in the use of Telemedicine to deliver medical services. In this book, we see the convergence of these two trends leading to a semantically-based TCM Telemedicine system that utilizes an ontology to provide sharable knowledge in the TCM realm to achieve this. The underpinning research required the development of a three-layer architecture and an Ontology of the TCM knowledge. As TCM knowledge like all medical knowledge is not frozen in time it was important to develop an approach that would allow evolution of the Ontology when new evidence became available. In order for the system to be practically grounded it was important to work with an industry partner PuraPharm Group/HerbMiners Informatics Limited. This partnership was initiated through Professor Allan Wong and the Chairman of PuraPharm Group Mr. Abraham Chan. This led to the system being utilized in more than 20 Mobile Clinics in Hong Kong and 300 Hospitals in China. In order for these different deployments of the system to be coherent with the main core Ontology, it was necessary for us to develop an Ontology Driven Software System Generation approach.

Risk Assessment and Management in the Networked Economy (Paperback, 2013 ed.): Omar K. Hussain, Tharam S. Dillon, Farookh K.... Risk Assessment and Management in the Networked Economy (Paperback, 2013 ed.)
Omar K. Hussain, Tharam S. Dillon, Farookh K. Hussain, Elizabeth J. Chang
R3,880 Discovery Miles 38 800 Ships in 10 - 15 working days

Risk and reward are always foremost in the determination of investment decisions and business transactions. Advances in the area of Information Communication Technologies (ICT) have enabled the development of new business paradigms. Such paradigms involve transactions taking place between loosely connected parties, often totally or partially unknown to one another. One important concept required to ensure such transactions are successful is transactional risk. The importance of doing this has been demonstrated in recent financial crisis. This book is unique in simultaneously taking into account the likelihood of an event occurring and its financial impact and provides an integrated discussion of the process of transactional risk identification, assessment, evaluation, management and recording in these emerging domains. It provides a detailed and clear exposition of the importance of transactional risk before detailing for its assessment and evaluation. The scope of the book is theoretical and practical and as such it will have a broad market both within academia and industry. Specifically this book should be of primary interest to researchers, graduate students and practitioners in the area of developing business intelligence techniques and their application in various real world applications.

Computational Intelligence Techniques for New Product Design (Paperback, 2012 ed.): Kit Yan Chan, C.K. Kwong, Tharam S. Dillon Computational Intelligence Techniques for New Product Design (Paperback, 2012 ed.)
Kit Yan Chan, C.K. Kwong, Tharam S. Dillon
R4,473 Discovery Miles 44 730 Ships in 10 - 15 working days

Applying computational intelligence for product design is a fast-growing and promising research area in computer sciences and industrial engineering. However, there is currently a lack of books, which discuss this research area. This book discusses a wide range of computational intelligence techniques for implementation on product design. It covers common issues on product design from identification of customer requirements in product design, determination of importance of customer requirements, determination of optimal design attributes, relating design attributes and customer satisfaction, integration of marketing aspects into product design, affective product design, to quality control of new products. Approaches for refinement of computational intelligence are discussed, in order to address different issues on product design. Cases studies of product design in terms of development of real-world new products are included, in order to illustrate the design procedures, as well as the effectiveness of the computational intelligence based approaches to product design. This book covers the state-of-art of computational intelligence methods for product design, which provides a clear picture to post-graduate students in industrial engineering and computer science. It is particularly suitable for researchers and professionals working on computational intelligence for product design. It provides concepts, techniques and methodologies, for product designers in applying computational intelligence to deal with product design.

Mining of Data with Complex Structures (Paperback, 2010 ed.): Fedja Hadzic, Henry Tan, Tharam S. Dillon Mining of Data with Complex Structures (Paperback, 2010 ed.)
Fedja Hadzic, Henry Tan, Tharam S. Dillon
R4,502 Discovery Miles 45 020 Ships in 10 - 15 working days

Mining of Data with Complex Structures:

- Clarifies the type and nature of data with complex structure including sequences, trees and graphs

- Provides a detailed background of the state-of-the-art of sequence mining, tree mining and graph mining.

-Defines the essential aspects of the tree mining problem: subtree types, support definitions, constraints.

- Outlines the implementation issues one needs to consider when developing tree mining algorithms (enumeration strategies, data structures, etc.)

- Details the Tree Model Guided (TMG) approach for tree mining and provides the mathematical model for the worst case estimate of complexity of mining ordered induced and embedded subtrees.

- Explains the mechanism of the TMG framework for mining ordered/unordered induced/embedded and distance-constrained embedded subtrees.

- Provides a detailed comparison of the different tree mining approaches highlighting the characteristics and benefits of each approach.

- Overviews the implications and potential applications of tree mining in general knowledge management related tasks, and uses Web, health and bioinformatics related applications as case studies.

- Details the extension of the TMG framework for sequence mining

- Provides an overview of the future research direction with respect to technical extensions and application areas

The primary audience is 3rd year, 4th year undergraduate students, Masters and PhD students and academics. The book can be used for both teaching and research. The secondary audiences are practitioners in industry, business, commerce, government and consortiums, alliances and partnerships to learn how to introduce and efficiently make use of the techniques for mining of data with complex structures into their applications. The scope of the book is both theoretical and practical and as such it will reach a broad market both within academia and industry. In addition, its subject matter is a rapidly emerging field that is critical for efficient analysis of knowledge stored in various domains."

Risk Assessment and Management in the Networked Economy (Hardcover, 2013 ed.): Omar K. Hussain, Tharam S. Dillon, Farookh K.... Risk Assessment and Management in the Networked Economy (Hardcover, 2013 ed.)
Omar K. Hussain, Tharam S. Dillon, Farookh K. Hussain, Elizabeth J. Chang
R2,997 Discovery Miles 29 970 Ships in 10 - 15 working days

Risk and reward are always foremost in the determination of investment decisions and business transactions. Advances in the area of Information Communication Technologies (ICT) have enabled the development of new business paradigms. Such paradigms involve transactions taking place between loosely connected parties, often totally or partially unknown to one another. One important concept required to ensure such transactions are successful is transactional risk. The importance of doing this has been demonstrated in recent financial crisis. This book is unique in simultaneously taking into account the likelihood of an event occurring and its financial impact and provides an integrated discussion of the process of transactional risk identification, assessment, evaluation, management and recording in these emerging domains. It provides a detailed and clear exposition of the importance of transactional risk before detailing for its assessment and evaluation. The scope of the book is theoretical and practical and as such it will have a broad market both within academia and industry. Specifically this book should be of primary interest to researchers, graduate students and practitioners in the area of developing business intelligence techniques and their application in various real world applications.

Computational Intelligence Techniques for New Product Design (Hardcover, 2012 ed.): Kit Yan Chan, C.K. Kwong, Tharam S. Dillon Computational Intelligence Techniques for New Product Design (Hardcover, 2012 ed.)
Kit Yan Chan, C.K. Kwong, Tharam S. Dillon
R4,506 Discovery Miles 45 060 Ships in 10 - 15 working days

Applying computational intelligence for product design is a fast-growing and promising research area in computer sciences and industrial engineering. However, there is currently a lack of books, which discuss this research area. This book discusses a wide range of computational intelligence techniques for implementation on product design. It covers common issues on product design from identification of customer requirements in product design, determination of importance of customer requirements, determination of optimal design attributes, relating design attributes and customer satisfaction, integration of marketing aspects into product design, affective product design, to quality control of new products. Approaches for refinement of computational intelligence are discussed, in order to address different issues on product design. Cases studies of product design in terms of development of real-world new products are included, in order to illustrate the design procedures, as well as the effectiveness of the computational intelligence based approaches to product design. This book covers the state-of-art of computational intelligence methods for product design, which provides a clear picture to post-graduate students in industrial engineering and computer science. It is particularly suitable for researchers and professionals working on computational intelligence for product design. It provides concepts, techniques and methodologies, for product designers in applying computational intelligence to deal with product design.

Mining of Data with Complex Structures (Hardcover, 2010 ed.): Fedja Hadzic, Henry Tan, Tharam S. Dillon Mining of Data with Complex Structures (Hardcover, 2010 ed.)
Fedja Hadzic, Henry Tan, Tharam S. Dillon
R4,700 Discovery Miles 47 000 Ships in 10 - 15 working days

Mining of Data with Complex Structures:

- Clarifies the type and nature of data with complex structure including sequences, trees and graphs

- Provides a detailed background of the state-of-the-art of sequence mining, tree mining and graph mining.

-Defines the essential aspects of the tree mining problem: subtree types, support definitions, constraints.

- Outlines the implementation issues one needs to consider when developing tree mining algorithms (enumeration strategies, data structures, etc.)

- Details the Tree Model Guided (TMG) approach for tree mining and provides the mathematical model for the worst case estimate of complexity of mining ordered induced and embedded subtrees.

- Explains the mechanism of the TMG framework for mining ordered/unordered induced/embedded and distance-constrained embedded subtrees.

- Provides a detailed comparison of the different tree mining approaches highlighting the characteristics and benefits of each approach.

- Overviews the implications and potential applications of tree mining in general knowledge management related tasks, and uses Web, health and bioinformatics related applications as case studies.

- Details the extension of the TMG framework for sequence mining

- Provides an overview of the future research direction with respect to technical extensions and application areas

The primary audience is 3rd year, 4th year undergraduate students, Masters and PhD students and academics. The book can be used for both teaching and research. The secondary audiences are practitioners in industry, business, commerce, government and consortiums, alliances and partnerships to learn how to introduce and efficiently make use of the techniques for mining of data with complex structures into their applications. The scope of the book is both theoretical and practical and as such it will reach a broad market both within academia and industry. In addition, its subject matter is a rapidly emerging field that is critical for efficient analysis of knowledge stored in various domains."

Harnessing the Service Roundtrip over the Internet Support Time-Critical Applications - Concept, Techniques & Cases... Harnessing the Service Roundtrip over the Internet Support Time-Critical Applications - Concept, Techniques & Cases (Hardcover)
Allan Kang Ying Wong, Tharam S. Dillon, Wilfred Wan Kei Lin
R4,243 R2,667 Discovery Miles 26 670 Save R1,576 (37%) Ships in 12 - 17 working days

Although the Internet and World Wide Web (WWW) are popular as tools for convenient exchange of information, it is not easy to utilise the Internet for time-critical applications such as on-line remote diagnosis in telemedicine. It is a wish of the United Nations to bring e-health to every corner of the world via the Internet. This is easier said than done because the sheer size of the Internet implies unpredictable faults of all kinds. These faults are physically translated into communication and computation delays. Since these faults and delays have many contributing factors that can change suddenly, it is impractical to monitor them all for the sake of fault tolerance. For this reason the new concept of interpreting the channel dynamics by gauging its end-to-end behaviour has emerged. The aim is to measure the changes of the average service roundtrip time (RTT) over time and interpret the possible signs of faults from these changes. If the length of the average service RTT is suddenly increased in an exponential manner, network congestion and widespread retransmission are indicated. Then, the Internet and/or the applications running on it should invoke fault tolerance measures to prevent system breakdown and partial failures. This concept of gauging the channel dynamics to prevent system failure is generally known as Internet End-to-End Performance Measurement (IEPM). The purpose of the book is to shed light on some of the novel practical fault tolerance techniques that can help shorten the end-to-end service roundtrip (RTT) time of a logical Internet channel. As a result the Internet can be harnessed for serious time-critical applications. Several practical cases are presented to demonstrate how the effective harnessing can be achieved.

Soft Computing in Case Based Reasoning (Paperback, Edition.): Sankar Kumar Pal, Tharam S. Dillon, Daniel S. Yeung Soft Computing in Case Based Reasoning (Paperback, Edition.)
Sankar Kumar Pal, Tharam S. Dillon, Daniel S. Yeung
R2,418 Discovery Miles 24 180 Out of stock

Soft Computing in Case Based Reasoning demonstrates how various soft computing tools can be applied to design and develop methodologies and systems with case based reasoning for real-life decision-making or recognition problems.Comprising contributions from experts from all over the world, it:- Provides an introduction to CBR and soft computing, and the relevance of their integration- Evaluates the strengths and weaknesses of CBR in its current form- Presents recent developments and significant applications in domains such as data-mining, medical diagnosis, knowledge-based expert systems, banking, and forensic investigation- Addresses new information on developing intelligent systemsThis book will be of particular interest to graduate students and researchers in computer science, electrical engineering and information technology but it will also be of interest to researchers and practitioners in the fields of systems design, pattern recognition and data mining.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Skyrmions and Hall Transport
Bom Soo Kim Hardcover R3,573 Discovery Miles 35 730
Nuclear Systems Volume II - Elements of…
Neil E. Todreas, Mujid S. Kazimi, … Hardcover R3,545 Discovery Miles 35 450
SiGe and Si Strained-Layer Epitaxy for…
John D. Cressler Hardcover R4,747 Discovery Miles 47 470
Introduction to Rocket Science and Space…
A. Sivathanu Pillai Hardcover R2,412 Discovery Miles 24 120
Boiler Operator's Handbook
Carl Buzzuto Hardcover R5,588 Discovery Miles 55 880
A ‘Light’ Guide to Energy Savings in…
Conor Molloy Hardcover R2,883 Discovery Miles 28 830
IoT, Machine learning and Blockchain…
C Sharmeela, P. Sanjeevikumar, … Hardcover R3,048 Discovery Miles 30 480
Power Trip - The Story of America's Love…
Amanda Little Paperback R464 R394 Discovery Miles 3 940
There Is No Planet B - A Handbook for…
Mike Berners-Lee Paperback R352 R289 Discovery Miles 2 890
Building Regulations Pocket Book
Ray Tricker, Samantha Alford Paperback R880 Discovery Miles 8 800

 

Partners