Описание: This book discusses the recent research trends and upcoming applications based on artificial intelligence.
Автор: Das Dr Anirban Название: Anirban`s Anthology ISBN: 151702675X ISBN-13(EAN): 9781517026752 Издательство: Неизвестно Цена: 948.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Автор: Bhattacharyya Siddhartha, Bhaumik Hrishikesh, Mukherjee Anirban Название: Machine Learning for Big Data Analysis ISBN: 3110550326 ISBN-13(EAN): 9783110550320 Издательство: Walter de Gruyter Рейтинг: Цена: 22305.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:
This volume comprises six well-versed contributed chapters devoted to report the latest fi ndings on the applications of machine learning for big data analytics. Big data is a term for data sets that are so large or complex that traditional data processing application software is inadequate to deal with them. The possible challenges in this direction include capture, storage, analysis, data curation, search, sharing, transfer, visualization, querying, updating and information privacy.
Big data analytics is the process of examining large and varied data sets - i.e., big data - to uncover hidden patterns, unknown correlations, market trends, customer preferences and other useful information that can help organizations make more-informed business decisions. This volume is intended to be used as a reference by undergraduate and post graduate students of the disciplines of computer science, electronics and telecommunication, information science and electrical engineering.
THE SERIES: FRONTIERS IN COMPUTATIONAL INTELLIGENCE
The series Frontiers In Computational Intelligence is envisioned to provide comprehensive coverage and understanding of cutting edge research in computational intelligence. It intends to augment the scholarly discourse on all topics relating to the advances in artifi cial life and machine learning in the form of metaheuristics, approximate reasoning, and robotics. Latest research fi ndings are coupled with applications to varied domains of engineering and computer sciences. This field is steadily growing especially with the advent of novel machine learning algorithms being applied to different domains of engineering and technology. The series brings together leading researchers that intend to continue to advance the fi eld and create a broad knowledge about the most recent research.
Автор: Saha Anirban Название: Salt Cookbook ISBN: 1784399744 ISBN-13(EAN): 9781784399740 Издательство: Неизвестно Рейтинг: Цена: 9010.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Автор: Mazumder Anirban Название: Database Law: Perspectives from India ISBN: 9811095582 ISBN-13(EAN): 9789811095580 Издательство: Springer Рейтинг: Цена: 13974.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: INTRODUCTIONGrowth of Database Industry and its Need CHAPTER 1: INFORMATION, PROPERTY & PROTECTION 1.1 Role of Information in Today's World 1.2 Justification for Protection 1.3 Changing Features of Property 1.4 Information as Property 1.5 Tangibility and Intangibility 1.6 Private and Public Interest CHAPTER 2: COPYRIGHT, ACCESS & INFORMATIONSOCIETY2.1 Copyright Protection and Public/Private Interest2.2 Copyright and Access to Information 2.3 Copyright and Free Speech 2.4 Copyright and Incentive for Investment 2.5 Requirement of Originality in Copyright INTRODUCTIONGrowth of Database Industry and its Need CHAPTER 1: INFORMATION, PROPERTY & PROTECTION 1.1 Role of Information in Today's World1.2 Justification for Protection1.3 Changing Features of Property1.4 Information as Property1.5 Tangibility and Intangibility1.6 Private and Public Interest CHAPTER 2: COPYRIGHT, ACCESS & INFORMATIONSOCIETY2.1 Copyright Protection and Public/Private Interest2.2 Copyright and Access to Information2.3 Copyright and Free Speech2.4 Copyright and Incentive foCHAPTER 3: COPYRIGHT, DATA BASES & PROTECTION 3.1 Analysis of Copyright Law3.1.1 Objectives of Copyright 3.1.2 Interpreting Originality in Copyright3.1.3 Originality - Traditional Approach3.1.4 Changing Notion of Originality3.1.5 Traditional v. Modern Approach3.1.6 Sweat of the Brow Doctrine 3.1.7 Rationale For Sweat Doctrine 3.1.8 Origin of Sweat Doctrine3.1.9 Implication of Sweat Doctrine3.1.10 Fall of Sweat Doctrine3.1.11 Is Sweat Doctrine Still Valid ?3.1.12 Fallacies of Sweat Doctrine 3.1.13 Application of the Sweat Doctrine in India 3.2 Impact on Copyright Law 3.3 Impact of the Feist Judgment on Copyright Law 3.4 Impact on Databases 3.5 Importance of Copyright in Protecting Databases 3.6 Position of Database v. Protection 3.7 Role of Competition Law in Maintaining Balance CHAPTER 4: DATABASE PROTECTION - EUROPEANEXPERIENCE4.1 Role of Database Directive in Protecting Database 4.1.1 Definition of Database 4.1.2 Substantial Investment 4.1.3 Creation, Extraction & Re-utilization 4.1.4 Exceptions 4.1.5 Term of Protection 4.2 Role of Database Directive in Limiting Monopoly 4.3 Evaluation of Database Directive 4.4 BHB Factor CHAPTER 5: ABORTED AMERICAN ATTEMPTS 5.1 Definition of Database 5.2 Unauthorised Use 5.3 Investment 5.4 Infringement 5.5 Permitted Use 5.6 Penalty 5.7 Duration 5.8 Review 5.9 Comparison 5.10 Comments 5.11 Effects 5.12 Concluding Remarks CHAPTER 6: INDIAN DATABASE INDUSTRY & LEGALREGIME6.1 Indian Database Industry 6.2 Response of the Database Industry 6.3 Existing Legal Regime in Indi
Автор: Arsel Murat, Dasgupta Anirban, Storm Servaas Название: Reclaiming Development Studies: Essays for Ashwani Saith ISBN: 1785279963 ISBN-13(EAN): 9781785279966 Издательство: Неизвестно Рейтинг: Цена: 22990.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:
This book aims to reclaim the mission, relevance and intellectual orientation of development studies - something that is increasingly challenged from different directions. Confronted by the status quoist enterprise of randomized control trials ( RCTs) on the one hand and the radical endeavour to decolonize dominant knowledge systems (decoloniality) on the other, the study of development as an enduring societal ambition needs urgent revival.
The essays featured in this book build on the contributions of Ashwani Saith - an ardent critic of development orthodoxy and who at the same time is not ready to give up on the emancipatory potential of the development project. Written by leading scholars in the field, the essays touch upon many of the key questions of development studies centred around structural change, labour and poverty and inequality. They also highlight the continued necessity to ground the study of development processes in a critical political economy approach while interrogating the quick-fixes touted by the mainstream discourse on development.
Written by an acknowledged expert in the field, this book focuses on approaches for designing secure hardware accelerators for digital signal processing and image processing, which are also optimised for performance and efficiency. State-of-the art security and optimization algorithms are presented, and their roles in the design of secured hardware accelerators for DSP, multimedia and image processing applications are explored.
The book begins with an introduction to the principles of secured and optimized hardware accelerators for DSP and image processing applications. The following topics are then given thorough and systematic coverage: cryptography driven IP steganography for DSP hardware accelerators; double line of defence to secure JPEG codec hardware for medical imaging systems; integrating multi-key based structural obfuscation and low-level watermarking for double line of defence of DSP hardware accelerators; multimodal hardware accelerators for image processing filters; fingerprint biometric for securing hardware accelerators; key-triggered hash-chaining based encoded hardware steganography for Securing DSP hardware accelerators; designing N-point DFT hardware accelerator using obfuscation and steganography; and structural transformation and obfuscation frameworks for data-intensive IPs.
Intended primarily for researchers and practicing engineers, the book will also be of interest to graduate students with a particular interest in hardware device security.
This book presents advanced forensic detective control and obfuscation techniques for securing hardware IP cores by exploring beyond conventional technologies. The theme is important to researchers in various areas of specialization, because it encompasses the overlapping topics of EDA-CAD, hardware design security, VLSI design, IP core protection, optimization using evolutionary computing, system-on-chip design and finally application specific processor/hardware accelerator design for consumer electronics applications.
The book begins by introducing forensic detective control and obfuscation mechanisms for hardware and IP core security. Further chapters cover hardware stenography, digital signature driven hardware authentication, fault-secured IP cores using digital signature-based watermarks, multi-level watermarking, cryptosystem-based multi-variable fingerprinting, multi-phase and hologram-based obfuscation, and security of functionally obfuscated DSP cores.
IP Core Protection and Hardware-Assisted Security for Consumer Electronics presents established and novel solutions for security and protection problems related to IP cores (especially those based on DSP/multimedia applications) in consumer electronics. The topic is important to researchers in various areas of specialization, encompassing overlapping topics such as EDA-CAD, hardware design security, VLSI design, IP core protection, optimization using evolutionary computing, system-on-chip design and application specific processor/hardware accelerator design.
The book begins by introducing the concepts of security, privacy and IP protection in information systems. Later chapters focus specifically on hardware-assisted IP security in consumer electronics, with coverage including essential topics such as hardware Trojan security, robust watermarking, fingerprinting, structural and functional obfuscation, encryption, IoT security, forensic engineering based protection, JPEG obfuscation design, hardware assisted media protection, PUF and side-channel attack resistance.
This book works at the intersection of two related yet different fields. One is the heterogeneous feminist effort to question universal forms of knowing. The expression 'embodiment of knowledge' deploys the notions of time (as history), space (as location) and politics (as partiality of perspective or standpoint) to interrogate the purported universality of knowing. Embodiment is one important concept through which feminist philosophies try to perceive the attempt of questioning the universal. The second field follows from mind/body dichotomy. Embodiment is traditionally understood to involve an act of simple inversion - valorizing the (material) body in place of the mind. However, if meanings are seen to produce the body as 'a system of signification', embodiment gets reduced to another form of the significatory mechanism. The book explored the dynamics of the production of the 'body' with a focus on the 'others' (death, sexual and colonial differences) that fracture and define the notion of the body. An ethical responsibility to the 'others' consonant with this ontologically differentiated body distinguishes this notion of embodiment from standard versions of 'third world feminism'. The development of this notion requires an elaboration of the ways in which power and scientific rationality work (epistemically) in a postcolonial setting. Finally, the book presents the notion of embodied knowledges as inseparable from a deconstructive politics of the (im)possible.
ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru