Skip to main content

Books in Applications general

Fixed Point Optimization Algorithms and Their Applications

  • 1st Edition
  • November 23, 2024
  • Watcharaporn Cholamjiak
  • English
  • Paperback
    9 7 8 - 0 - 4 4 3 - 3 3 5 8 6 - 0
  • eBook
    9 7 8 - 0 - 4 4 3 - 3 3 5 8 7 - 7
Fixed Point Optimization Algorithms and Their Applications discusses how the relationship between fixed point algorithms and optimization problems is connected and demonstrates hands-on applications of the algorithms in fields such as image restoration, signal recovery, and machine learning. The author presents algorithms for non-expansive and generalized non-expansive mappings in Hilbert space, and includes solutions to many optimization problems across a range of scientific research and real-world applications. From foundational concepts, the book proceeds to present a variety of optimization algorithms, including fixed point theories, convergence theorems, variational inequality problems, minimization problems, split feasibility problems, variational inclusion problems, and equilibrium problems.This book will equip readers with the theoretical mathematics background and necessary tools to tackle challenging optimization problems involving a range of algebraic methods, empowering them to apply these techniques in their research, professional work, or academic pursuits.

Nature-Inspired Computation and Swarm Intelligence

  • 1st Edition
  • April 9, 2020
  • Xin-She Yang
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 1 9 7 1 4 - 1
  • eBook
    9 7 8 - 0 - 1 2 - 8 2 2 6 0 9 - 4
Nature-inspired computation and swarm intelligence have become popular and effective tools for solving problems in optimization, computational intelligence, soft computing and data science. Recently, the literature in the field has expanded rapidly, with new algorithms and applications emerging. Nature-Inspired Computation and Swarm Intelligence: Algorithms, Theory and Applications is a timely reference giving a comprehensive review of relevant state-of-the-art developments in algorithms, theory and applications of nature-inspired algorithms and swarm intelligence. It reviews and documents the new developments, focusing on nature-inspired algorithms and their theoretical analysis, as well as providing a guide to their implementation. The book includes case studies of diverse real-world applications, balancing explanation of the theory with practical implementation. Nature-Inspired Computation and Swarm Intelligence: Algorithms, Theory and Applications is suitable for researchers and graduate students in computer science, engineering, data science, and management science, who want a comprehensive review of algorithms, theory and implementation within the fields of nature inspired computation and swarm intelligence.

Data Architecture: A Primer for the Data Scientist

  • 2nd Edition
  • April 30, 2019
  • W.H. Inmon + 2 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 1 6 9 1 6 - 2
  • eBook
    9 7 8 - 0 - 1 2 - 8 1 6 9 1 7 - 9
Over the past 5 years, the concept of big data has matured, data science has grown exponentially, and data architecture has become a standard part of organizational decision-making. Throughout all this change, the basic principles that shape the architecture of data have remained the same. There remains a need for people to take a look at the "bigger picture" and to understand where their data fit into the grand scheme of things. Data Architecture: A Primer for the Data Scientist, Second Edition addresses the larger architectural picture of how big data fits within the existing information infrastructure or data warehousing systems. This is an essential topic not only for data scientists, analysts, and managers but also for researchers and engineers who increasingly need to deal with large and complex sets of data. Until data are gathered and can be placed into an existing framework or architecture, they cannot be used to their full potential. Drawing upon years of practical experience and using numerous examples and case studies from across various industries, the authors seek to explain this larger picture into which big data fits, giving data scientists the necessary context for how pieces of the puzzle should fit together.

How Information Systems Can Help in Alarm/Alert Detection

  • 1st Edition
  • November 8, 2018
  • Florence Sedes
  • English
  • Hardback
    9 7 8 - 1 - 7 8 5 4 8 - 3 0 2 - 8
  • eBook
    9 7 8 - 0 - 0 8 - 1 0 2 9 3 0 - 5
Alarm or alert detection remains an issue in various areas from nature, i.e. flooding, animals or earthquake, to software systems. Liveness, dynamicity, reactivity of alarm systems: how to ensure the warning information reach the right destination at the right moment and in the right location, still being relevant for the recipient, in spite of the various and successive filters of confidentiality, privacy, firewall policies, etc.? Also relevant in this context are to technical contingency issues: material failure, defect of connection, break of channels, independence of information routes and sources? Alarms with crowd media, (mis)information vs. rumours: how to make the distinction? The prediction of natural disasters (floods, avalanches, etc.), health surveillance (affectionate fevers of cattle, pollution by pesticides, etc.), air, sea and land transport, or space surveillance to prevent Risks of collisions between orbital objects involve more and more actors within Information Systems, one of whose purposes is the dissemination of alerts. By expanding the capabilities and functionality of such national or international systems, social networks are playing a growing role in dissemination and sharing, eg. with the support of systems like the Google Alert (https://www.google.fr/alerts) which concerns the publication of contents online. Recently, the Twitter microblogging platform announced a broadcast service, designed to help government organizations with alerts to the public. The proper functioning of such systems depends on fundamental properties such as resilience, liveliness and responsiveness: any alert must absolutely reach the right recipient at the right time and in the right place, while remaining relevant to him, despite the various constraints. on the one hand to external events, such as hardware failures, connection faults, breaks in communication channels, on the other hand to confidentiality, such as the collection and use of personal data (with or without the consent of the user), or the disparity of access policies (generation according to industrial, technological, security constraints, management of internal / external policies, etc.) between actors. This book opens the discussion on the "procrastination", the dynamics and the reactivity of the alert systems, but also the problems of confidentiality, filtering of information, and the means of distinguishing information and rumor.

Newnes Electronics Assembly Pocket Book

  • 1st Edition
  • July 26, 2017
  • Keith Brindley
  • English
  • eBook
    9 7 8 - 1 - 4 8 3 2 - 9 1 9 3 - 2
Produced in association with the Engineering Training Authority with contributions from dozens of people in the electronics industry. The material covers common skills in electrical and electronic engineering and concentrates mainly on wiring and assembly. 'Newnes Electronics Assembly Pocket Book' is for electronics technicians, students and apprentices.

Passive and Discrete Circuits

  • 1st Edition
  • Volume 2
  • June 23, 2016
  • R M MARSTON
  • English
  • eBook
    9 7 8 - 1 - 4 8 3 2 - 9 1 9 8 - 7
Passive components and discrete devices form the bedrocks on which all modern electronic circuits are built. This Pocket Book is a single volume applications guide to the most popular and useful of these devices, containing 670 diagrams, tables and carefully selected practical circuits. Throughout the Pocket Book great emphasis is placed on practical user information and circuitry. All of the active devices used are modestly priced and readily available.The book is split into twenty chapters. The first three explain important practical features of the ranges of modern passive electrical components, including relays, meters, motors, sensors and transducers. Chapters 4 to 6 deal with the design ofpractical attenuators, filters, and 'bridge' circuits. The remaining fourteen chapters deal with specific types of discrete semiconductor device, including various types of diode, transistors, JFETs, MOSFETs, VMOS devices, UJTs, SCRs, TRIACs, and various optoelectronic devices. This easy-to-read, concise, highly practical and largely non-mathematical volume is aimed directly at engineers, technicians, students and competent experimenters who can build a design directly from a circuit diagram, and if necessary modify it to suit individual needs. Ray Marston is the author of the multi-volume series of Newnes Circuits Manuals. His magazine articles on circuit design appear regularly in a wide range of publications worldwide.

Cyber Guerilla

  • 1st Edition
  • June 13, 2016
  • Jelle Van Haaster + 2 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 5 1 9 7 - 9
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 5 2 8 4 - 6
Much as Che Guevara’s book Guerilla Warfare helped define and delineate a new type of warfare in the wake of the Cuban revolution in 1961, Cyber Guerilla will help define the new types of threats and fighters now appearing in the digital landscape. Cyber Guerilla provides valuable insight for infosec professionals and consultants, as well as government, military, and corporate IT strategists who must defend against myriad threats from non-state actors. The authors take readers inside the operations and tactics of cyber guerillas, who are changing the dynamics of cyber warfare and information security through their unconventional strategies and threats. This book draws lessons from the authors’ own experiences but also from illustrative hacker groups such as Anonymous, LulzSec and Rebellious Rose.

HCISPP Study Guide

  • 1st Edition
  • December 10, 2014
  • Timothy Virtue + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 2 0 4 3 - 2
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 2 0 8 9 - 0
The HCISPP certification is a globally-recognized, vendor-neutral exam for healthcare information security and privacy professionals, created and administered by ISC². The new HCISPP certification, focused on health care information security and privacy, is similar to the CISSP, but has only six domains and is narrowly targeted to the special demands of health care information security. Tim Virtue and Justin Rainey have created the HCISPP Study Guide to walk you through all the material covered in the exam's Common Body of Knowledge. The six domains are covered completely and as concisely as possible with an eye to acing the exam. Each of the six domains has its own chapter that includes material to aid the test-taker in passing the exam, as well as a chapter devoted entirely to test-taking skills, sample exam questions, and everything you need to schedule a test and get certified. Put yourself on the forefront of health care information privacy and security with the HCISPP Study Guide and this valuable certification.

Industrial Network Security

  • 2nd Edition
  • December 9, 2014
  • Eric D. Knapp + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 4 2 0 1 1 4 - 9
  • eBook
    9 7 8 - 0 - 1 2 - 4 2 0 1 8 4 - 2
As the sophistication of cyber-attacks increases, understanding how to defend critical infrastructure systems—energy production, water, gas, and other vital systems—becomes more important, and heavily mandated. Industrial Network Security, Second Edition arms you with the knowledge you need to understand the vulnerabilities of these distributed supervisory and control systems. The book examines the unique protocols and applications that are the foundation of industrial control systems, and provides clear guidelines for their protection. This how-to guide gives you thorough understanding of the unique challenges facing critical infrastructures, new guidelines and security measures for critical infrastructure protection, knowledge of new and evolving security tools, and pointers on SCADA protocols and security implementation.

Data Architecture: A Primer for the Data Scientist

  • 1st Edition
  • November 26, 2014
  • W.H. Inmon + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 2 0 4 4 - 9
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 2 0 9 1 - 3
Today, the world is trying to create and educate data scientists because of the phenomenon of Big Data. And everyone is looking deeply into this technology. But no one is looking at the larger architectural picture of how Big Data needs to fit within the existing systems (data warehousing systems). Taking a look at the larger picture into which Big Data fits gives the data scientist the necessary context for how pieces of the puzzle should fit together. Most references on Big Data look at only one tiny part of a much larger whole. Until data gathered can be put into an existing framework or architecture it can’t be used to its full potential. Data Architecture a Primer for the Data Scientist addresses the larger architectural picture of how Big Data fits with the existing information infrastructure, an essential topic for the data scientist. Drawing upon years of practical experience and using numerous examples and an easy to understand framework. W.H. Inmon, and Daniel Linstedt define the importance of data architecture and how it can be used effectively to harness big data within existing systems. You’ll be able to: Turn textual information into a form that can be analyzed by standard tools. Make the connection between analytics and Big Data Understand how Big Data fits within an existing systems environment Conduct analytics on repetitive and non-repetitive data