Title search results
Showing 26901 - 26920 of 56298 items
The Everyday Life of an Algorithm
By Daniel Neyland. 2019
This open access book begins with an algorithm–a set of IF…THEN rules used in the development of a new, ethical,…
video surveillance architecture for transport hubs. Readers are invited to follow the algorithm over three years, charting its everyday life. Questions of ethics, transparency, accountability and market value must be grasped by the algorithm in a series of ever more demanding forms of experimentation. Here the algorithm must prove its ability to get a grip on everyday life if it is to become an ordinary feature of the settings where it is being put to work. Through investigating the everyday life of the algorithm, the book opens a conversation with existing social science research that tends to focus on the power and opacity of algorithms. In this book we have unique access to the algorithm’s design, development and testing, but can also bear witness to its fragility and dependency on others.Die Kaufempfehlung, die Ihnen ein Webstore ausspricht, die Einschätzung, welcher Kunde kreditwürdig ist, oder die Analyse der Werttreiber von Immobilien…
– alle diese Beispiele aus dem heutigen Leben sind Ergebnis moderner Verfahren der Datenanalyse. Dieses Buch führt in solche statistische Verfahren anhand der Programmiersprache R ein. Ziel ist es, Leser mit der Art und Weise vertraut zu machen, wie führende Organisationen und Praktiker angewandte Statistik heute einsetzen. Weil sich mit der Digitalisierung auch die statistischen Verfahren verändert haben, vermittelt der Autor neben klassischen Analysemethoden wie Regression auch moderne Methoden wie Textmining und Random-Forest-Modelle. Dabei sind die Inhalte des Buchs durchgehend so aufbereitet, dass sie auch für Leser ohne umfangreiche mathematische Vorkenntnisse verständlich sind. Anhand von Fallbeispielen und Übungen werden die Leser durch alle Phasen der Datenanalyse geführt: Sie lernen, wie Daten eingelesen, aufbereitet, visualisiert, modelliert und kommuniziert werden können. Dabei wird vor allem die Aufbereitung, Umformung und Prüfung der Daten ausführlicher als in anderen Publikationen behandelt, da dieser Teil in der Praxis oft einen wesentlichen Teil des Aufwands ausmacht. Aber auch die Visualisierung bekommt viel Raum, denn gute Diagramme ermöglichen Einblicke, die Zahlen und Worte verbergen.Mit seinem praxisorientierten Ansatz will das Buch dazu befähigen,alle grundlegenden Schritte eines Datenanalyseprojekts durchzuführen,Daten kompetent in R zu bearbeiten,simulationsbasierte Inferenzstatistik anzuwenden und kritisch zu hinterfragen,klassische und moderne Vorhersagemethoden anzuwenden undbetriebswirtschaftliche Fragestellungen mittels datengetriebener Vorhersagemodelle zu beantworten.Sowohl Anwender ohne statistisches Grundlagenwissen als auch Nutzer mit Vorerfahrung lesen dieses Buch mit Gewinn. In verständlicher Sprache und anhand von anschaulichen Beispielen zeigt der Autor, wie moderne Datenanalyse heute funktioniert.Essential Scrum: A Practical Guide to the Most Popular Agile Process
By Kenneth Rubin. 2013
Essential Scrum will provide every team member, manager, and executive with a common understanding of Scrum, a shared vocabulary they…
can use in applying it, and practical knowledge for deriving maximum value from it. Whether you are new to Scrum or years into your use, this book will introduce, clarify, and deepen your Scrum knowledge at the team, product, and portfolio levels. Drawing from Rubin’s experience helping hundreds of organizations succeed with Scrum, this book provides easy-to-digest descriptions enhanced by more than two hundred illustrations based on an entirely new visual icon language for describing Scrum’s roles, artifacts, and activities. Essential Scrum is the complete, single-source reference to develop innovative products and services that delight your customers.This book will be especially useful for project managers but it's also intended for other Jira users, including developers, and…
any other industry besides software development, who would like to leverage Jira's powerful task management and workflow features to better manage their business processes.Foundations of Data Science Based Healthcare Internet of Things (SpringerBriefs in Applied Sciences and Technology)
By Parikshit N. Mahalle, Sheetal S. Sonawane. 2021
This book offers a basic understanding of the Internet of Things (IoT), its design issues and challenges for healthcare applications. It also…
provides details of the challenges of healthcare big data, role of big data in healthcare and techniques, and tools for IoT in healthcare. This book offers a strong foundation to a beginner. All technical details that include healthcare data collection unit, technologies and tools used for the big data analytics implementation are explained in a clear and organized format.R for Programmers: Quantitative Investment Applications
By Dan Zhang. 2018
After the fundamental volume and the advanced technique volume, this volume focuses on R applications in the quantitative investment area.…
Quantitative investment has been hot for some years, and there are more and more startups working on it, combined with many other internet communities and business models. R is widely used in this area, and can be a very powerful tool. The author introduces R applications with cases from his own startup, covering topics like portfolio optimization and risk management.Software Methodologies: A Quantitative Guide
By Capers Jones. 2018
This comprehensive reference uses a formal and standard evaluation technique to show the strengths and weakness of more than 60…
software development methodologies such as agile, DevOps, RUP, Waterfall, TSP, XP and many more. Each methodology is applied to an application of 1000 function points using the Java language. Each methodology produces a characteristic set of results for development schedules, productivity, costs, and quality. The intent of the book is to show readers the optimum kinds of methodologies for the projects they are concerned with and to warn them about counter indications and possible harm from unsuitable methodologies.Parab - December 2020: પરબ - ડીસેમ્બર ૨૦૨૦
By Yogesh Joshi. 2020
Integrating a Usable Security Protocol into User Authentication Services Design Process
By Ahmed Seffah, Christina Braz, Bilal Naqvi. 2019
There is an intrinsic conflict between creating secure systems and usable systems. But usability and security can be made synergistic…
by providing requirements and design tools with specific usable security principles earlier in the requirements and design phase. In certain situations, it is possible to increase usability and security by revisiting design decisions made in the past; in others, to align security and usability by changing the regulatory environment in which the computers operate. This book addresses creation of a usable security protocol for user authentication as a natural outcome of the requirements and design phase of the authentication method development life cycle.Deep Learning with R
By Abhijit Ghatak. 2019
Deep Learning with R introduces deep learning and neural networks using the R programming language. The book builds on the…
understanding of the theoretical and mathematical constructs and enables the reader to create applications on computer vision, natural language processing and transfer learning. The book starts with an introduction to machine learning and moves on to describe the basic architecture, different activation functions, forward propagation, cross-entropy loss and backward propagation of a simple neural network. It goes on to create different code segments to construct deep neural networks. It discusses in detail the initialization of network parameters, optimization techniques, and some of the common issues surrounding neural networks such as dealing with NaNs and the vanishing/exploding gradient problem. Advanced variants of multilayered perceptrons namely, convolutional neural networks and sequence models are explained, followed by application to different use cases. The book makes extensive use of the Keras and TensorFlow frameworks.MySQL Concurrency: Locking and Transactions for MySQL Developers and DBAs
By Jesper Wisborg Krogh. 2021
Know how locks work in MySQL and how they relate to transactions. This book explains the major role that locks…
play in database systems, showing how locks are essential in allowing high-concurrency workloads. You will learn about lock access levels and lock granularities from the user level as well as table locks to record and gap locks. Most importantly, the book covers troubleshooting techniques when locking becomes a pain point. Several of the lock types in MySQL have a duration of a transaction. For this reason, it is important to understand how transactions work. This book covers the basics of transactions as well as transaction isolation levels and how they affect locking. The book is meant to be your go-to resource for solving locking contention and similar problems in high-performance MySQL database applications. Detecting locking issues when they occur is the first key to resolving such issues. MySQL Concurrency provides techniques for detecting locking issues such as contention. The book shows how to analyze locks that are causing contention to see why those locks are in place. A collection of six comprehensive case studies combine locking and transactional theory with realistic lock conflicts. The case studies walk you through the symptoms to look for in order to identify which issue you are facing, the cause of the conflict, its analysis, solution, and how to prevent the issue in the future. What You Will LearnUnderstand which lock types exist in MySQL and how they are usedChoose the best transaction isolation level for a given transactionDetect and analyze lock contention when it occursReduce locking issues in your applicationsResolve deadlocks between transactionsResolve InnoDB record-level locking issuesResolve issues from metadata and schema locksWho This Book Is ForDatabase administrators and SQL developers who are familiar with MySQL and want to gain a better understanding of locking and transactions as well as how to work with them. While some experience with MySQL is required, no prior knowledge of locks and transactions is needed.Data Analytics in Project Management (Data Analytics Applications)
By Seweryn Spalek. 2019
This book aims to help the reader better understand the importance of data analysis in project management. Moreover, it provides…
guidance by showing tools, methods, techniques and lessons learned on how to better utilize the data gathered from the projects. First and foremost, insight into the bridge between data analytics and project management aids practitioners looking for ways to maximize the practical value of data procured. The book equips organizations with the know-how necessary to adapt to a changing workplace dynamic through key lessons learned from past ventures. The book’s integrated approach to investigating both fields enhances the value of research findings.This book constitutes the revised post-conference proceedings of the 16th European Conference on Multi-Agent Systems, EUMAS 2018, held at Bergen,…
Norway, in December 2018.The 18 full papers presented in this volume were carefully reviewed and selected from a total of 34 submissions. The papers report on both early and mature research and cover a wide range of topics in the field of multi-agent systems.Handbook of Graphical Models (Chapman & Hall/CRC Handbooks of Modern Statistical Methods)
By Steffen Lauritzen, Martin Wainwright, Marloes Maathuis, Mathias Drton. 2019
A graphical model is a statistical model that is represented by a graph. The factorization properties underlying graphical models facilitate…
tractable computation with multivariate distributions, making the models a valuable tool with a plethora of applications. Furthermore, directed graphical models allow intuitive causal interpretations and have become a cornerstone for causal inference. While there exist a number of excellent books on graphical models, the field has grown so much that individual authors can hardly cover its entire scope. Moreover, the field is interdisciplinary by nature. Through chapters by leading researchers from different areas, this handbook provides a broad and accessible overview of the state of the art. Key features: * Contributions by leading researchers from a range of disciplines * Structured in five parts, covering foundations, computational aspects, statistical inference, causal inference, and applications * Balanced coverage of concepts, theory, methods, examples, and applications * Chapters can be read mostly independently, while cross-references highlight connections The handbook is targeted at a wide audience, including graduate students, applied researchers, and experts in graphical models.Communication and Computing Systems: Proceedings of the International Conference on Communication and Computing Systems (ICCCS 2016), Gurgaon, India, 9-11 September, 2016
By Karan Singh, B.M.K. Prasad, Krishna Kant Singh, Neelam Ruhil, Richard O'Kennedy. 2016
This book is a collection of accepted papers that were presented at the International Conference on Communication and Computing Systems…
(ICCCS-2016), Dronacharya College of Engineering, Gurgaon, September 9–11, 2016. The purpose of the conference was to provide a platform for interaction between scientists from industry, academia and other areas of society to discuss the current advancements in the field of communication and computing systems. The papers submitted to the proceedings were peer-reviewed by 2-3 expert referees. This volume contains 5 main subject areas: 1. Signal and Image Processing, 2. Communication & Computer Networks, 3. Soft Computing, Intelligent System, Machine Vision and Artificial Neural Network, 4. VLSI & Embedded System, 5. Software Engineering and Emerging Technologies.Computational Intelligence Assisted Design: In Industrial Revolution 4.0
By Yun Li, Yi Chen. 2018
Computational Intelligence Assisted Design framework mobilises computational resources, makes use of multiple Computational Intelligence (CI) algorithms and reduces computational costs.…
This book provides examples of real-world applications of technology. Case studies have been used to show the integration of services, cloud, big data technology and space missions. It focuses on computational modelling of biological and natural intelligent systems, encompassing swarm intelligence, fuzzy systems, artificial neutral networks, artificial immune systems and evolutionary computation. This book provides readers with wide-scale information on CI paradigms and algorithms, inviting readers to implement and problem solve real-world, complex problems within the CI development framework. This implementation framework will enable readers to tackle new problems without difficulty through a few tested MATLAB source codesSocial Networks with Rich Edge Semantics (Chapman & Hall/CRC Data Mining and Knowledge Discovery Series)
By Quan Zheng, David Skillicorn. 2017
Social Networks with Rich Edge Semantics introduces a new mechanism for representing social networks in which pairwise relationships can be…
drawn from a range of realistic possibilities, including different types of relationships, different strengths in the directions of a pair, positive and negative relationships, and relationships whose intensities change with time. For each possibility, the book shows how to model the social network using spectral embedding. It also shows how to compose the techniques so that multiple edge semantics can be modeled together, and the modeling techniques are then applied to a range of datasets. Features Introduces the reader to difficulties with current social network analysis, and the need for richer representations of relationships among nodes, including accounting for intensity, direction, type, positive/negative, and changing intensities over time Presents a novel mechanism to allow social networks with qualitatively different kinds of relationships to be described and analyzed Includes extensions to the important technique of spectral embedding, shows that they are mathematically well motivated and proves that their results are appropriate Shows how to exploit embeddings to understand structures within social networks, including subgroups, positional significance, link or edge prediction, consistency of role in different contexts, and net flow of properties through a node Illustrates the use of the approach for real-world problems for online social networks, criminal and drug smuggling networks, and networks where the nodes are themselves groups Suitable for researchers and students in social network research, data science, statistical learning, and related areas, this book will help to provide a deeper understanding of real-world social networks.R Quick Syntax Reference: A Pocket Guide to the Language, APIs and Library
By Margot Tollefson. 2019
This handy reference book detailing the intricacies of R updates the popular first edition by adding R version 3.4 and…
3.5 features. Starting with the basic structure of R, the book takes you on a journey through the terminology used in R and the syntax required to make R work. You will find looking up the correct form for an expression quick and easy. Some of the new material includes information on RStudio, S4 syntax, working with character strings, and an example using the Twitter API.With a copy of the R Quick Syntax Reference in hand, you will find that you are able to use the multitude of functions available in R and are even able to write your own functions to explore and analyze data.What You Will LearnDiscover the modes and classes of R objects and how to use themUse both packaged and user-created functions in R Import/export data and create new data objects in RCreate descriptive functions and manipulate objects in RTake advantage of flow control and conditional statementsWork with packages such as base, stats, and graphicsWho This Book Is ForThose with programming experience, either new to R, or those with at least some exposure to R but who are new to the latest version.This book constitutes the thoroughly refereed post-conference proceedings of the 28th International Symposium on Logic-Based Program Synthesis and Transformation, LOPSTR…
2018, held in Frankfurt/Main, Germany, in September 2018.The 11 revised full papers were carefully reviewed and selected from 29 submissions. In addition to the 11 papers, this volume includes 3 abstracts of invited talks and 2 abstracts of invited tutorials. The papers are grouped into the following topics: analysis of term rewriting; logic-based distributed/concurrent programming; analysis of logic programming; and program analysis.