The Cloud in IoT-enabled Spaces The Cloud in IoT-enabled Spaces addresses major issues and challenges in IoT-based solutions proposed for the Cloud. It paves the way for IoT-enabled spaces in the next generation cloud computing paradigm and opens the door for further innovative ideas. Topics include Cloud-based optimization in the IoT era scheduling and routing medium access data caching secure access uncertainty home automation machine learning in wearable devices energy monitoring and plant phenotyping in farming. Smart spaces are solutions where Internet of Things (IoT)-enabling technologies have been employed towards further advances in the lifestyle. It tightly integrates with the existing Cloud infrastructure to impact several fields in academia and industry. The Cloud in IoT-enabled Spaces provides an overview of the issues around small spaces and proposes the most up-to-date alternatives and solutions. The objective is to pave the way for IoT-enabled spaces in the next-generation Cloud computing and open the door for further innovative ideas. GBP 42.99 1
Securing the Cloud Security Strategies for the Ubiquitous Data Center This book provides solutions for securing important data stored in something as nebulous sounding as a cloud. A primer on the concepts behind security and the cloud it explains where and how to store data and what should be avoided at all costs. It presents the views and insight of the leading experts on the state of cloud computing security and its future. It also provides no-nonsense info on cloud security technologies and models. Securing the Cloud: Security Strategies for the Ubiquitous Data Center takes the position that cloud security is an extension of recognized established security principles into cloud-based deployments. It explores how those principles can be put into practice to protect cloud-based infrastructure and data traditional infrastructure and hybrid architectures combining cloud and on-premises infrastructure. Cloud computing is evolving so rapidly that regulations and technology have not necessarily been able to keep pace. IT professionals are frequently left to force fit pre-existing solutions onto new infrastructure and architectures for which they may be very poor fits. This book looks at how those square peg/round hole solutions are implemented and explains ways in which the pegs the holes or both may be adjusted for a more perfect fit. | Securing the Cloud Security Strategies for the Ubiquitous Data Center GBP 42.99 1
Cloud-Based Music Production Sampling Synthesis and Hip-Hop Cloud-Based Music Production: Samples Synthesis and Hip-Hop presents a discussion on cloud-based music-making procedures and the musical competencies required to make hip-hop beats. By investigating how hip-hop producers make music using cloud-based music production libraries this book reveals how those services impact music production en masse. Cloud-Based Music Production takes the reader through the creation of hip-hop beats from start to finish – from selecting samples and synthesizer presets to foundational mixing practices – and includes analysis and discussion of how various samples and synthesizers work together within an arrangement. Through case studies and online audio examples Shelvock explains how music producers directly modify the sonic characteristics of hip-hop sounds to suit their tastes and elucidates the psychoacoustic and perceptual impact of these aesthetically nuanced music production tasks. Cloud-Based Music Production will be of interest to musicians producers mixers and engineers and also provides essential supplementary reading for music technology courses. | Cloud-Based Music Production Sampling Synthesis and Hip-Hop GBP 36.99 1
The Introduction to Private Cloud using Oracle Exadata and Oracle Database Private clouds allow for managing multiple databases under one roof avoiding unnecessary resource management. Private cloud solutions can be applied in sectors such as healthcare retail and software. The Introduction to Private Cloud using Oracle Exadata and Oracle Database will explore the general architecture of private cloud databases with a focus on Oracle’s Exadata database machine. The book describes the private cloud using fundamental-level Exadata and database. Exadata has been Oracle’s pioneer product for almost a decade. In the last few years Oracle has positioned Exadata for customers to consume as a cloud service. This book will provide a timely introduction to Exadata for current and potential Oracle customers and other IT professionals. GBP 18.99 1
Business Model Transformation The AI & Cloud Technology Revolution A large opportunity exists for Australian organisations to use new and powerful technologies (Artificial intelligence [AI] and Cloud technologies) to transform their businesses to keep pace with or ahead of the leading edge of competitiveness. This book showcases inspirational Australian case studies in order to inspire Australian (and non-Australian) organisations to undertake the challenge. This book synthesises the key learnings and contrasts those with the conventional wisdom on this topic. The book also defines what AI- and Cloud-based business transformations are and what they can do for businesses. Furthermore it explains why it is imperative that businesses should address the business opportunities of these technological advancements without going into the technical details any more than the ‘literacy’ that is necessary for business leaders. Finally it also includes international best practice case studies beyond the usual suspects. This book provides guidance and motivation for business executives managers and students interested in innovating and transforming their businesses through the use of the two critical new technologies. | Business Model Transformation The AI & Cloud Technology Revolution GBP 39.99 1
Biometric Technology Authentication Biocryptography and Cloud-Based Architecture Most biometric books are either extraordinarily technical for technophiles or extremely elementary for the lay person. Striking a balance between the two Biometric Technology: Authentication Biocryptography and Cloud-Based Architecture is ideal for business IT or security managers that are faced with the task of making purchasing migration or adoption decisions. It brings biometrics down to an understandable level so that you can immediately begin to implement the concepts discussed. Exploring the technological and social implications of widespread biometric use the book considers the science and technology behind biometrics as well as how it can be made more affordable for small and medium-sized business. It also presents the results of recent research on how the principles of cryptography can make biometrics more secure. Covering biometric technologies in the cloud including security and privacy concerns the book includes a chapter that serves as a how-to manual on procuring and deploying any type of biometric system. It also includes specific examples and case studies of actual biometric deployments of localized and national implementations in the U. S. and other countries. The book provides readers with a technical background on the various biometric technologies and how they work. Examining optimal application in various settings and their respective strengths and weaknesses it considers ease of use false positives and negatives and privacy and security issues. It also covers emerging applications such as biocryptography. Although the text can be understood by just about anybody it is an ideal resource for corporate-level executives who are considering implementing biometric technologies in their organizations. | Biometric Technology Authentication Biocryptography and Cloud-Based Architecture GBP 31.99 1
Deploying the Zero Trust Framework in MSFT Azure The Cloud is fast becoming the de facto standard for businesses in Corporate America today with Microsoft Azure being one of the most widely used systems. However given its stature it has also become a prime target for the cyberattacker. Thus a Zero Trust Framework is strongly needed. Deploying the Zero Trust Framework in MSFT Azure takes a closer look at the Cloud the Zero Trust Framework and how to deploy from both the technical and psychological perspectives. GBP 29.99 1
Handbook of e-Business Security There are a lot of e-business security concerns. Knowing about e-business security issues will likely help overcome them. Keep in mind companies that have control over their e-business are likely to prosper most. In other words setting up and maintaining a secure e-business is essential and important to business growth. This book covers state-of-the art practices in e-business security including privacy trust security of transactions big data cloud computing social network and distributed systems. | Handbook of e-Business Security GBP 42.99 1
Computational Topology for Biomedical Image and Data Analysis Theory and Applications This book provides an accessible yet rigorous introduction to topology and homology focused on the simplicial space. It presents a compact pipeline from the foundations of topology to biomedical applications. It will be of interest to medical physicists computer scientists and engineers as well as undergraduate and graduate students interested in this topic. Features:Presents a practical guide to algebraic topology as well as persistence homologyContains application examples in the field of biomedicine including the analysis of histological images and point cloud data | Computational Topology for Biomedical Image and Data Analysis Theory and Applications GBP 18.99 1
Software Engineering with UML This book presents the analysis design documentation and quality of software solutions based on the OMG UML v2. 5. Notably it covers 14 different modelling constructs including use case diagrams activity diagrams business-level class diagrams corresponding interaction diagrams and state machine diagrams. It presents the use of UML in creating a Model of the Problem Space (MOPS) Model of the Solution Space (MOSS) and Model of the Architectural Space (MOAS). The book touches important areas of contemporary software engineering ranging from how a software engineer needs to invariably work in an Agile development environment through to the techniques to model a Cloud-based solution. | Software Engineering with UML GBP 42.99 1
Digital Enterprise Transformation A Business-Driven Approach to Leveraging Innovative IT The integration of technological innovations such as In-Memory Analytics Cloud Computing Mobile Connectivity and Social Media with business practice can enable significant competitive advantage. In order to embrace recent challenges and changes in the governance of IT strategies SAP and its think tank - the Business Transformation Academy (BTA) - have jointly developed the Digital Capability Framework (DCF). Digital Enterprise Transformation: A Business-Driven Approach to Leveraging Innovative IT by Axel Uhl and Lars Alexander Gollenia outlines the DCF which comprises six specific capabilities: Innovation Management Transformation Management IT Excellence Customer Centricity Effective Knowledge Worker and Operational Excellence. In cooperation with the University of Applied Sciences and Arts Northwestern Switzerland University of St. Gallen (Switzerland) Queensland University of Technology (Australia) University of Liechtenstein (Principality of Liechtenstein) and Karlsruhe Institute of Technology (Germany) SAP and the BTA have been validating each capability and the corresponding maturity models based on analyzing several ’lighthouse’ case studies comprising: SAMSUNG IBM Finanz Informatik The Walt Disney Company Google Inc. HILTI AG. Digital Enterprise Transformation presents how these companies take advantage of innovative IT and how they develop their digital capabilities. On top the authors also develop and present a range of novel yet hands-on Digital Use Cases for a number of different industries which have emerged from innovative technological trends such as: Big Data Cloud Computing 3D Printing and Internet of Things. | Digital Enterprise Transformation A Business-Driven Approach to Leveraging Innovative IT GBP 31.99 1
Digital Transformation in Healthcare An Ecosystem Approach In an era of digital transformation within healthcare management this important book outlines an ecosystem perspective to illustrate how a range of actors can use digital technologies to offer better value within the provision of healthcare services. From mobile applications to point-of-care diagnostic devices from AI-enabled applications for data analysis to cloud models for service delivery and blockchain infrastructures it provides a roadmap for how healthcare organizations can leverage these digital technologies. The book is also illustrated with case studies from different areas including software for medical diagnostics blockchain infrastructures for use in pharmaceutical supply chains and clinical trials and federated learning platforms for genomics. Covering key issues such as patients’ rights to data and written in the aftermath of the COVID-19 pandemic the book will be essential reading for researchers postgraduate students and professionals interested in how technology can support and enable healthcare service provision. | Digital Transformation in Healthcare An Ecosystem Approach GBP 35.99 1
AI in Health A Leader’s Guide to Winning in the New Age of Intelligent Health Systems We are in the early stages of the next big platform shift in healthcare computing. Fueled by Artificial Intelligence (AI) and the Cloud this shift is already transforming the way health and medical services are provided. As the industry transitions from static digital repositories to intelligent systems there will be winners and losers in the race to innovate and automate the provision of services. Critical to success will be the role leaders play in shaping the use of AI to be less artificial and more intelligent in support of improving processes to deliver care and keep people healthy and productive across all care settings. This book defines key technical process people and ethical issues that need to be understood and addressed in successfully planning and executing an enterprise-wide AI plan. It provides clinical and business leaders with a framework for moving organizations from the aspiration to execution of intelligent systems to improve clinical operational and financial performance. | AI in Health A Leader’s Guide to Winning in the New Age of Intelligent Health Systems GBP 38.99 1
The Stage Manager's Toolkit Templates and Communication Techniques to Guide Your Theatre Production from First Meeting to Final Performance The Stage Manager’s Toolkit Third Edition provides a comprehensive account of the role of the stage manager for live theatre with a focus on both written and verbal communication best practices. The book outlines the duties of the stage manager and assistant stage manager throughout a production discussing not only what to do but why. It also identifies communication objectives for each phase of production paperwork to be created and the necessary questions to be answered in order to ensure success. This third edition includes: an updated look at digital stage management tools including script apps cloud storage and social media practices; a new discussion on creating a healthy and safe rehearsal space; updated paperwork examples; new information on Equity practices for the student and early career stage managers. Written for the stage management student and early career stage manager this book is a perfect companion to any university Stage Management course. A companion website hosts customizable paperwork templates instructional video links to additional information teacher tools for each individual chapter and a bonus chapter on teaching stage management. | The Stage Manager's Toolkit Templates and Communication Techniques to Guide Your Theatre Production from First Meeting to Final Performance GBP 31.99 1
Therapy and the Postpartum Woman Notes on Healing Postpartum Depression for Clinicians and the Women Who Seek their Help Written by a pioneer and continuing advocate for perinatal health this book remains remains an enduring reference for any therapist working with pregnant or postpartum women and their families suffering from perinatal mood and anxiety disorders. This Classic Edition includes a new preface by Hilary Waller that reflects on changes in the field since the book’s first publication. Using a blend of professional objectivity evidence-based research and personal straight-forward suggestions gathered from years of experience this book brings the reader into the private world of therapy with the postpartum woman. Based on psychodynamic and cognitive-behavioral theories and on D. W. Winnicott's ‘good-enough mother’ and the ‘holding environment’ the book is written by a therapist who has specialized in the treatment of postpartum depression for over 30 years. Chapters address diagnosis medication depression psychosis suicidal thoughts bonding as well as finding meaning and the power to heal during recovery. Bringing further attention to under recognized illnesses which plague mothers and cloud the childbirth experience this Classic Edition serves as an accessible companion tool for clinicians and the women they treat. | Therapy and the Postpartum Woman Notes on Healing Postpartum Depression for Clinicians and the Women Who Seek their Help GBP 31.99 1
Planning and Designing the IP Broadcast Facility A New Puzzle to Solve This book provides a comprehensive understanding of the technology architecture physical facility changes and – most importantly – the new media management workflows and business processes to support the entire lifecycle of the IP broadcast facility from an engineering and workflow perspective. Fully updated this second edition covers the technological evolutions and changes in the media broadcast industry including the new standards and specifications for live IP production the SMPTE ST2110 suite of standards the necessity of protecting against cyber threats and the expansion of cloud services in opening new possibilities. It provides users with the necessary information for planning organizing producing and distributing media for the modern broadcast facility. Key features of this text include: Strategies to implement a cost-effective live and file-based production and distribution system. A cohesive big-picture viewpoint that helps you identify how to overcome the challenges of upgrading your plant. The impact live production is having on the evolution to IP. Case studies serve as recommendations and examples of use. New considerations in engineering and maintenance of IP and file-based systems. Those in the fields of TV cable IT engineering and broadcast engineering will find this book an invaluable resource as will students learning how to set up modern broadcast facilities and the workflows of contemporary broadcasting. | Planning and Designing the IP Broadcast Facility A New Puzzle to Solve GBP 29.99 1
Architectures of Care From the Intimate to the Common Drawing from a diverse range of interdisciplinary voices this book explores how spaces of care shape our affective material and social forms from the most intimate scale of the body to our planetary commons. Typical definitions of care center around the maintenance of a livable life encompassing everything from shelter and welfare to health and safety. Architecture plays a fundamental role in these definitions inscribed in institutional archetypes such as the home the hospital the school and the nursery. However these spaces often structure modes of care that prescribe gender roles bodily norms and labor practices. How can architecture instead engage with an expanded definition of care that questions such roles and norms producing more hybrid entanglements between our bodies our collective lives and our environments? Chapters in this book explore issues ranging from disabled domesticities and nursing unbuilding whiteness in the built environment practices and pedagogies of environmental care and the solidarity networks within ‘The Cloud’. Case studies include Floating University Berlin commoning initiatives by the Black Panther party and hospitals for the United Mine Workers of America among many other sites and scales of care. Exploring architecture through the lenses of gender studies labor theory environmental justice and the medical humanities this book will engage students and academics from a wide range of disciplines. | Architectures of Care From the Intimate to the Common GBP 35.99 1
The Busy IT Manager’s Guide to Data Recovery No IT manager or worker enjoys being woken up the middle of the night over a system fault. But arguably the worst way to be awakened is over a situation where data loss has occurred – and the recovery is going wrong. The Busy IT Manager’s Guide to Data Recovery takes a razor focus on the details IT managers (and their teams) responsible for data recovery and resiliency within their business need to be aware of in the design of robust data protection systems. This book covers key architectural requirements of a data resilient system and the types of technology a business can deploy for data protection that maximises the potential for a successful recovery. With cyber-attacks being a daily challenge for IT and business now the book also takes an in-depth look at the special considerations companies need to take in order to guarantee the recoverability of data after a destructive cyber event. Regardless of whether your IT infrastructure runs on-premises or in the public cloud this book gives you the information you need to plan and run a successful data recovery solution that meets your business needs. Preston de Guise has been working with data recovery products for his entire career – designing implementing and supporting solutions for governments universities and businesses ranging from SMEs to Fortune 500 companies. This broad exposure to industry verticals and business sizes has enabled Preston to understand not only the technical requirements of data protection and recovery but the management and procedural aspects too. GBP 22.99 1
Supply Chain Analytics Using Data to Optimise Supply Chain Processes Supply Chain Analytics introduces the reader to data analytics and demonstrates the value of their effective use in supply chain management. By describing the key supply chain processes through worked examples and the descriptive predictive and prescriptive analytic methods that can be applied to bring about improvements to those processes the book presents a more comprehensive learning experience for the reader than has been offered previously. Key topics are addressed including optimisation big data data mining and cloud computing. The author identifies four core supply chain processes – strategy design execution and people – to which the analytic techniques explained can be applied to ensure continuous improvement. Pedagogy to aid learning is incorporated throughout including an opening section for each chapter explaining the learnings designed for the chapter; worked examples illustrating how each analytic technique works how it is applied and what to be careful of; tables diagrams and equations to help ‘visualise’ the concepts and methods covered; chapter case studies; and end-of-chapter review questions and assignment tasks. Providing both management expertise and technical skills which are essential to decision-makers in the supply chain this textbook should be essential reading for advanced undergraduate and postgraduate students of supply chain analytics supply chain leadership and supply chain and operations management. Its practice-based and applied approach also makes it valuable for operating supply chain practitioners and those studying for professional qualifications. Online resources include chapter-by-chapter PowerPoint slides tutorial exercises written assignments and a test bank of exam questions. | Supply Chain Analytics Using Data to Optimise Supply Chain Processes GBP 42.99 1
Cybersecurity Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare The World Economic Forum regards the threat of cyber attack as one of the top five global risks confronting nations of the world today. Cyber attacks are increasingly targeting the core functions of the economies in nations throughout the world. The threat to attack critical infrastructures disrupt critical services and induce a wide range of damage is becoming more difficult to defend against. Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare examines the current cyber threat landscape and discusses the strategies being used by governments and corporations to protect against these threats. The book first provides a historical reference detailing the emergence of viruses worms malware and other cyber threats that created the need for the cybersecurity field. It then discusses the vulnerabilities of our critical infrastructures the broad arsenal of cyber attack tools and the various engineering design issues involved in protecting our infrastructures. It goes on to cover cyber intelligence tactics recent examples of cyber conflict and warfare and the key issues in formulating a national strategy to defend against cyber warfare. The book also discusses how to assess and measure the cost of cybersecurity. It examines the many associated cost factors and presents the results of several important industry-based economic studies of security breaches that have occurred within many nations. The book concludes with a look at future trends in cybersecurity. It discusses the potential impact of industry-wide transformational changes such as virtualization social media cloud computing structured and unstructured data big data and data analytics. | Cybersecurity Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare GBP 38.99 1
Industrial IoT Application Architectures and Use Cases As the number of Internet of Things (IoT) elements grows exponentially their interactions can generate a massive amount of raw and multi-structured data. The challenge with this data explosion is to transform any raw data into information and knowledge which can be used by people and systems to make intelligent decisions. Industrial IoT Application Architectures and Use Cases explores how artificial intelligence (AI) data analytics and IoT technology combine to promote intelligent decision-making and automation in a range of industries. With faster more stable AI algorithms and approaches knowledge discovery and dissemination from IoT-device data can be simplified and streamlined. An era of powerful cognitive technology is beginning due to cloud-based cognitive systems that are forming the foundation of game-changing intelligent applications. This book presents next-generation use cases of IoT and IoT data analytics for a variety of industrial verticals as given below: An Intelligent IoT framework for smart water managementAn IoT-enabled smart traffic control system for congestion control and smart traffic management An intelligent airport system for airport management and security surveillanceAn IoT framework for healthcare to integrate and report patient information Fuzzy scheduling with IoT for tracking and monitoring hotel assets An IoT system for designing drainage systems and monitoring drainage pipes Predictive maintenance of plant equipment to decide the actual mean time to malfunction Integrated neural networks and IoT systems for predictive equipment maintenance IoT integration in blockchain for smart waste management This book also includes a chapter on the IoT paradigm and an overview of uses cases for personal social and industrial applications. GBP 42.99 1
101 Rules of Thumb for Low-Energy Architecture Buildings and construction are a major contributor to the climate and biodiversity emergency. They account for nearly 40% of energy-related carbon dioxide (CO2) emissions. It is more important than ever for architects to design responsibly and create low-carbon low-energy buildings for a sustainable future. 101 Rules of Thumb sets out the essential elements of low-energy architecture in a fresh intuitive way. Where ever-changing technology and complex legislation can cloud the designer’s thought-process this book equips you with the fundamentals you need to minimise CO2 emissions design for low-energy use and work with not against the forces of nature. With reliable simple rules of thumb each page focuses on a single piece of guidance along with a clear hand-drawn illustration. The emphasis is on passive low-energy principles and the rules of thumb cover all the design fundamentals from site and location to orientation and form peppered with ideas to help the designer think outside the box drawing inspiration from traditional methods photoperiodic plants and the black-tailed prairie dog. An extended fully updated narrative bibliography explores the sources in detail and provides a valuable springboard for further study. Applicable throughout the world in any climate region 101 Rules of Thumb is a global primer to be dipped into at any time as a quick means of re-focusing on what’s important when designing a new or retrofitted low-energy building. The rules cover: Site and location Orientation and form The low-energy building envelope Carbon free heating cooling and lighting Passive low-energy principles. | 101 Rules of Thumb for Low-Energy Architecture GBP 22.00 1
The Internet of Things and Big Data Analytics Integrated Platforms and Industry Use Cases This book comprehensively conveys the theoretical and practical aspects of IoT and big data analytics with the solid contributions from practitioners as well as academicians. This book examines and expounds the unique capabilities of the big data analytics platforms in capturing cleansing and crunching IoT device/sensor data in order to extricate actionable insights. A number of experimental case studies and real-world scenarios are incorporated in this book in order to instigate our book readers. This bookAnalyzes current research and development in the domains of IoT and big data analyticsGives an overview of latest trends and transitions happening in the IoT data analytics spaceIllustrates the various platforms processes patterns and practices for simplifying and streamlining IoT data analytics The Internet of Things and Big Data Analytics: Integrated Platforms and Industry Use Cases examines and accentuates how the multiple challenges at the cusp of IoT and big data can be fully met. The device ecosystem is growing steadily. It is forecast that there will be billions of connected devices in the years to come. When these IoT devices resource-constrained as well as resource-intensive interact with one another locally and remotely the amount of multi-structured data generated collected and stored is bound to grow exponentially. Another prominent trend is the integration of IoT devices with cloud-based applications services infrastructures middleware solutions and databases. This book examines the pioneering technologies and tools emerging and evolving in order to collect pre-process store process and analyze data heaps in order to disentangle actionable insights. | The Internet of Things and Big Data Analytics Integrated Platforms and Industry Use Cases GBP 42.99 1
Cyber Resilience Modern cyber systems acquire more emergent system properties as far as their complexity increases: cyber resilience controllability self-organization proactive cyber security and adaptability. Each of the listed properties is the subject of the cybernetics research and each subsequent feature makes sense only if there is a previous one. Cyber resilience is the most important feature of any cyber system especially during the transition to the sixth technological stage and related Industry 4. 0 technologies: Artificial Intelligence (AI) Cloud and foggy computing 5G + IoT/IIoT Big Data and ETL Q-computing Blockchain VR/AR etc. We should even consider the cyber resilience as a primary one because the mentioned systems cannot exist without it. Indeed without the sustainable formation made of the interconnected components of the critical information infrastructure it does not make sense to discuss the existence of 4. 0 Industry cyber-systems. In case when the cyber security of these systems is mainly focused on the assessment of the incidents' probability and prevention of possible security threats the cyber resilience is mainly aimed at preserving the targeted behavior and cyber systems' performance under the conditions of known (about 45 %) as well as unknown (the remaining 55 %) cyber attacks. This monograph shows that modern Industry 4. 0. Cyber systems do not have the required cyber resilience for targeted performance under heterogeneous mass intruder cyber-attacks. The main reasons include a high cyber system structural and functional complexity a potential danger of existing vulnerabilities and “sleep” hardware and software tabs as well as an inadequate efficiency of modern models methods and tools to ensure cyber security reliability response and recovery. GBP 39.99 1
Image Analysis Classification and Change Detection in Remote Sensing With Algorithms for Python Fourth Edition Image Analysis Classification and Change Detection in Remote Sensing: With Algorithms for Python Fourth Edition is focused on the development and implementation of statistically motivated data-driven techniques for digital image analysis of remotely sensed imagery and it features a tight interweaving of statistical and machine learning theory of algorithms with computer codes. It develops statistical methods for the analysis of optical/infrared and synthetic aperture radar (SAR) imagery including wavelet transformations kernel methods for nonlinear classification as well as an introduction to deep learning in the context of feed forward neural networks. New in the Fourth Edition: An in-depth treatment of a recent sequential change detection algorithm for polarimetric SAR image time series. The accompanying software consists of Python (open source) versions of all of the main image analysis algorithms. Presents easy platform-independent software installation methods (Docker containerization). Utilizes freely accessible imagery via the Google Earth Engine and provides many examples of cloud programming (Google Earth Engine API). Examines deep learning examples including TensorFlow and a sound introduction to neural networks Based on the success and the reputation of the previous editions and compared to other textbooks in the market Professor Canty’s fourth edition differs in the depth and sophistication of the material treated as well as in its consistent use of computer codes to illustrate the methods and algorithms discussed. It is self-contained and illustrated with many programming examples all of which can be conveniently run in a web browser. Each chapter concludes with exercises complementing or extending the material in the text. | Image Analysis Classification and Change Detection in Remote Sensing With Algorithms for Python Fourth Edition GBP 42.99 1